提交 #741425: Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injection信息

标题Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injection
描述A a command execution vulnerability exists in the Tenda HG10 AC1200 Dualband Wi-Fi xPON ONT router. The vulnerability is located in the Boa web server’s formSysCmd interface and is related to improper handling of the sysCmd parameter. Because the system fails to apply sufficient input validation and filtering to this user-controllable parameter, an attacker can inject arbitrary system commands through specially crafted requests.
来源⚠️ https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formSysCmd-sysCmd-command.md
用户
 Abcd1234 (UID 94604)
提交2026-01-17 15時01分 (3 月前)
管理2026-01-30 08時57分 (13 days later)
状态已接受
VulDB条目343484 [Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon /boaform/formSysCmd system sysCmd 权限提升]
积分19

Interested in the pricing of exploits?

See the underground prices here!