. It is possible to initiate the attack remotely.
Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 30 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda 4g03 Pro Firmware
|
|
| CPEs | cpe:2.3:h:tenda:4g03_pro:1.0:*:*:*:*:*:*:* cpe:2.3:o:tenda:4g03_pro_firmware:04.03.01.53:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda 4g03 Pro Firmware
|
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda 4g03 Pro |
|
| Vendors & Products |
Tenda
Tenda 4g03 Pro |
Mon, 06 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Tenda 4G03 Pro 1.0/1.0re/01.bin/04.03.01.53. Affected by this issue is some unknown functionality of the file /etc/www/pem/server.key of the component ECDSA P-256 Private Key Handler. This manipulation causes use of hard-coded cryptographic key . It is possible to initiate the attack remotely. | |
| Title | Tenda 4G03 Pro ECDSA P-256 Private Key server.key hard-coded key | |
| Weaknesses | CWE-320 CWE-321 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-06T13:25:49.224Z
Reserved: 2026-04-04T06:20:03.869Z
Link: CVE-2026-5527
Updated: 2026-04-06T13:25:43.313Z
Status : Analyzed
Published: 2026-04-05T00:16:03.120
Modified: 2026-04-30T13:35:18.297
Link: CVE-2026-5527
No data.
OpenCVE Enrichment
Updated: 2026-04-06T21:57:28Z