Gửi #741411: Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injectionthông tin

tiêu đềTenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injection
Mô tảA command execution vulnerability exists in the Tenda HG10 AC1200 Dualband Wi-Fi xPON ONT router. The vulnerability is located in the Boa web server’s formLogin interface and is specifically related to the handling of the Host parameter. Due to insufficient input validation and filtering of this user-controllable parameter, an attacker can inject arbitrary system commands through specially crafted requests. By exploiting this vulnerability, an unauthenticated attacker is able to execute arbitrary commands on the affected device.
Nguồn⚠️ https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formLogin-Host-command.md
Người dùng
 Abcd1234 (UID 94604)
Đệ trình17/01/2026 13:30 (cách đây 3 các tháng)
Kiểm duyệt30/01/2026 08:56 (13 days later)
Trạng tháiđược chấp nhận
Mục VulDB343483 [Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Login Interface /boaform/admin/formLogin checkUserFromLanOrWan Host nâng cao đặc quyền]
điểm20

Do you want to use VulDB in your project?

Use the official API to access entries easily!