| Название | Tenda G103 G103_V1.0.0.5 Command Injection |
|---|
| Описание | A command injection vulnerability exists in the action_set_system_settings function of the system.lua file in Tenda G103 GPON optical network terminals. The vulnerability arises due to improper sanitization of the lanIp parameter, which is directly concatenated into system commands without validation. Authenticated attackers can exploit this to execute arbitrary system commands with root privileges, leading to full device compromise. |
|---|
| Источник | ⚠️ https://github.com/ZZ2266/.github.io/tree/main/Tenda%20G103/action_set_system_settings |
|---|
| Пользователь | n0ps1ed (UID 88889) |
|---|
| Представление | 16.03.2026 15:47 (20 дни назад) |
|---|
| Модерация | 01.04.2026 16:09 (16 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 354669 [Tenda G103 1.0.0.5 Setting system.lua action_set_system_settings lanIp эскалация привилегий] |
|---|
| Баллы | 20 |
|---|