{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T00:11:53.978","vulnerabilities":[{"cve":{"id":"CVE-2021-44971","sourceIdentifier":"cve@mitre.org","published":"2022-01-28T19:15:07.963","lastModified":"2024-11-21T06:31:45.903","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple Tenda devices are affected by authentication bypass, such as AC15V1.0 Firmware V15.03.05.20_multi?AC5V1.0 Firmware V15.03.06.48_multi and so on. an attacker can obtain sensitive information, and even combine it with authenticated command injection to implement RCE."},{"lang":"es","value":"Múltiples dispositivos Tenda están afectados por una omisión de autenticación, como AC15V1.0 Firmware versión V15.03.05.20_multi... AC5V1.0 Firmware versión V15.03.06.48_multi, etc. un atacante puede obtener información confidencial, e incluso combinarla con una inyección de comandos autenticados para implementar RCE"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-697"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tenda:ac15_firmware:15.03.05.20_multi:*:*:*:*:*:*:*","matchCriteriaId":"BAF4BBA3-7C56-4383-B167-933075D5C39F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tenda:ac15:1.0:*:*:*:*:*:*:*","matchCriteriaId":"D5059CAD-BD1A-4808-BCED-006444E60701"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tenda:ac5_firmware:15.03.06.48_multi:*:*:*:*:*:*:*","matchCriteriaId":"E540AF96-2B4E-4223-B15A-8DA89D2D12F1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*","matchCriteriaId":"D141716B-56F0-4061-9D87-943B7858F2F4"}]}]}],"references":[{"url":"http://ac15v10.com","source":"cve@mitre.org","tags":["Broken Link","URL Repurposed"]},{"url":"http://tenda.com","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://github.com/21Gun5/my_cve/blob/main/tenda/bypass_auth.md","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://ac15v10.com","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","URL Repurposed"]},{"url":"http://tenda.com","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://github.com/21Gun5/my_cve/blob/main/tenda/bypass_auth.md","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]}]}}]}