{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4252","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-16T06:16:02.051Z","datePublished":"2026-03-16T16:32:10.508Z","dateUpdated":"2026-03-16T18:07:41.022Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-16T16:32:10.508Z"},"title":"Tenda AC8 IPv6 check_is_ipv6 ip address for authentication","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-291","lang":"en","description":"Reliance on IP Address for Authentication"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-287","lang":"en","description":"Improper Authentication"}]}],"affected":[{"vendor":"Tenda","product":"AC8","versions":[{"version":"16.03.50.11","status":"affected"}],"cpes":["cpe:2.3:o:tenda:ac8_firmware:*:*:*:*:*:*:*:*"],"modules":["IPv6 Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"CRITICAL"}},{"cvssV3_1":{"version":"3.1","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:R","baseSeverity":"CRITICAL"}},{"cvssV3_0":{"version":"3.0","baseScore":9.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:R","baseSeverity":"CRITICAL"}},{"cvssV2_0":{"version":"2.0","baseScore":10,"vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:W/RC:UR"}}],"timeline":[{"time":"2026-03-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-16T07:21:15.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"DigitalAndrew (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.351210","name":"VDB-351210 | Tenda AC8 IPv6 check_is_ipv6 ip address for authentication","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.351210","name":"VDB-351210 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.771759","name":"Submit #771759 | Tenda AC8 V5 V16.03.50.11 Authentication Bypass Issues","tags":["third-party-advisory"]},{"url":"https://github.com/digitalandrew/tenda_ac8_v5/blob/main/poc_ipv6_auth_bypass.py","tags":["exploit"]},{"url":"https://www.tenda.com.cn/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-16T18:07:31.177772Z","id":"CVE-2026-4252","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-16T18:07:41.022Z"}}]}}