| Название | Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injection |
|---|
| Описание | A a command execution vulnerability exists in the Tenda HG10 AC1200 Dualband Wi-Fi xPON ONT router. The vulnerability is located in the Boa web server’s formSysCmd interface and is related to improper handling of the sysCmd parameter. Because the system fails to apply sufficient input validation and filtering to this user-controllable parameter, an attacker can inject arbitrary system commands through specially crafted requests. |
|---|
| Источник | ⚠️ https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formSysCmd-sysCmd-command.md |
|---|
| Пользователь | Abcd1234 (UID 94604) |
|---|
| Представление | 17.01.2026 15:01 (3 месяцы назад) |
|---|
| Модерация | 30.01.2026 08:57 (13 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 343484 [Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon /boaform/formSysCmd system sysCmd эскалация привилегий] |
|---|
| Баллы | 19 |
|---|