| 제목 | Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injection |
|---|
| 설명 | A command execution vulnerability exists in the Tenda HG10 AC1200 Dualband Wi-Fi xPON ONT router. The vulnerability is located in the Boa web server’s formLogin interface and is specifically related to the handling of the Host parameter. Due to insufficient input validation and filtering of this user-controllable parameter, an attacker can inject arbitrary system commands through specially crafted requests. By exploiting this vulnerability, an unauthenticated attacker is able to execute arbitrary commands on the affected device. |
|---|
| 원천 | ⚠️ https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formLogin-Host-command.md |
|---|
| 사용자 | Abcd1234 (UID 94604) |
|---|
| 제출 | 2026. 01. 17. PM 01:30 (3 개월 ago) |
|---|
| 모더레이션 | 2026. 01. 30. AM 08:56 (13 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 343483 [Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Login Interface /boaform/admin/formLogin checkUserFromLanOrWan Host 권한 상승] |
|---|
| 포인트들 | 20 |
|---|