| Название | Tenda G103 G103_V1.0.0.5 Command Injection |
|---|
| Описание | A command injection vulnerability exists in the action_set_net_settings function within the gpon.lua file of Tenda G103 GPON optical network terminals. This vulnerability is caused by improper sanitization of the authLoid parameter, which is directly concatenated into system commands without validation. Authenticated attackers can exploit this flaw to execute arbitrary system commands with root privileges, potentially leading to full device compromise. |
|---|
| Источник | ⚠️ https://github.com/ZZ2266/.github.io/tree/main/Tenda%20G103/authLoid |
|---|
| Пользователь | n0ps1ed (UID 88889) |
|---|
| Представление | 16.03.2026 15:47 (21 дни назад) |
|---|
| Модерация | 01.04.2026 16:09 (16 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 354670 [Tenda G103 1.0.0.5 Setting gpon.lua action_set_net_settings эскалация привилегий] |
|---|
| Баллы | 20 |
|---|