| Title | Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injection |
|---|
| Description | A a command execution vulnerability exists in the Tenda HG10 AC1200 Dualband Wi-Fi xPON ONT router. The vulnerability is located in the Boa web server’s formSysCmd interface and is related to improper handling of the sysCmd parameter. Because the system fails to apply sufficient input validation and filtering to this user-controllable parameter, an attacker can inject arbitrary system commands through specially crafted requests. |
|---|
| Source | ⚠️ https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formSysCmd-sysCmd-command.md |
|---|
| User | Abcd1234 (UID 94604) |
|---|
| Submission | 01/17/2026 15:01 (3 months ago) |
|---|
| Moderation | 01/30/2026 08:57 (13 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 343484 [Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon /boaform/formSysCmd system sysCmd command injection] |
|---|
| Points | 19 |
|---|