. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 29 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:h:tenda:ac10:4.0:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac10_firmware:16.03.10.10_multi_tde01:*:*:*:*:*:*:* |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac10
|
|
| Vendors & Products |
Tenda ac10
|
Mon, 06 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 05 Apr 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this issue is some unknown functionality of the file /webroot_ro/pem/privkeySrv.pem of the component RSA 2048-bit Private Key Handler. Executing a manipulation can lead to use of hard-coded cryptographic key . The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. | |
| Title | Tenda AC10 RSA 2048-bit Private Key privkeySrv.pem hard-coded key | |
| First Time appeared |
Tenda
Tenda ac10 Firmware |
|
| Weaknesses | CWE-320 CWE-321 |
|
| CPEs | cpe:2.3:o:tenda:ac10_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenda
Tenda ac10 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-06T16:21:09.043Z
Reserved: 2026-04-04T13:28:08.788Z
Link: CVE-2026-5549
Updated: 2026-04-06T16:21:04.726Z
Status : Analyzed
Published: 2026-04-05T08:16:24.863
Modified: 2026-04-29T23:41:38.303
Link: CVE-2026-5549
No data.
OpenCVE Enrichment
Updated: 2026-04-06T21:57:05Z