| Titre | Tenda G103 G103_V1.0.0.5 Command Injection |
|---|
| Description | A command injection vulnerability exists in the action_set_system_settings function of the system.lua file in Tenda G103 GPON optical network terminals. The vulnerability arises due to improper sanitization of the lanIp parameter, which is directly concatenated into system commands without validation. Authenticated attackers can exploit this to execute arbitrary system commands with root privileges, leading to full device compromise. |
|---|
| La source | ⚠️ https://github.com/ZZ2266/.github.io/tree/main/Tenda%20G103/action_set_system_settings |
|---|
| Utilisateur | n0ps1ed (UID 88889) |
|---|
| Soumission | 16/03/2026 15:47 (il y a 20 jours) |
|---|
| Modérer | 01/04/2026 16:09 (16 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 354669 [Tenda G103 1.0.0.5 Setting system.lua action_set_system_settings lanIp élévation de privilèges] |
|---|
| Points | 20 |
|---|