| 标题 | Tenda G103 G103_V1.0.0.5 Command Injection |
|---|
| 描述 | A command injection vulnerability exists in the action_set_system_settings function of the system.lua file in Tenda G103 GPON optical network terminals. The vulnerability arises due to improper sanitization of the lanIp parameter, which is directly concatenated into system commands without validation. Authenticated attackers can exploit this to execute arbitrary system commands with root privileges, leading to full device compromise. |
|---|
| 来源 | ⚠️ https://github.com/ZZ2266/.github.io/tree/main/Tenda%20G103/action_set_system_settings |
|---|
| 用户 | n0ps1ed (UID 88889) |
|---|
| 提交 | 2026-03-16 15時47分 (20 日前) |
|---|
| 管理 | 2026-04-01 16時09分 (16 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 354669 [Tenda G103 1.0.0.5 Setting system.lua action_set_system_settings lanIp 权限提升] |
|---|
| 积分 | 20 |
|---|