Submit #741411: Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injectioninfo

TitleTenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injection
DescriptionA command execution vulnerability exists in the Tenda HG10 AC1200 Dualband Wi-Fi xPON ONT router. The vulnerability is located in the Boa web server’s formLogin interface and is specifically related to the handling of the Host parameter. Due to insufficient input validation and filtering of this user-controllable parameter, an attacker can inject arbitrary system commands through specially crafted requests. By exploiting this vulnerability, an unauthenticated attacker is able to execute arbitrary commands on the affected device.
Source⚠️ https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formLogin-Host-command.md
User
 Abcd1234 (UID 94604)
Submission01/17/2026 13:30 (3 months ago)
Moderation01/30/2026 08:56 (13 days later)
StatusAccepted
VulDB entry343483 [Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Login Interface /boaform/admin/formLogin checkUserFromLanOrWan Host command injection]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!