| عنوان | Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injection |
|---|
| الوصف | A command execution vulnerability exists in the Tenda HG10 AC1200 Dualband Wi-Fi xPON ONT router. The vulnerability is located in the Boa web server’s formLogin interface and is specifically related to the handling of the Host parameter. Due to insufficient input validation and filtering of this user-controllable parameter, an attacker can inject arbitrary system commands through specially crafted requests. By exploiting this vulnerability, an unauthenticated attacker is able to execute arbitrary commands on the affected device. |
|---|
| المصدر | ⚠️ https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formLogin-Host-command.md |
|---|
| المستخدم | Abcd1234 (UID 94604) |
|---|
| ارسال | 17/01/2026 01:30 PM (3 أشهر منذ) |
|---|
| الاعتدال | 30/01/2026 08:56 AM (13 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 343483 [Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Login Interface /boaform/admin/formLogin checkUserFromLanOrWan Host تجاوز الصلاحيات] |
|---|
| النقاط | 20 |
|---|