| 标题 | Tenda AC10 V4 US_AC10V4.0si_V16.03.10.10_multi_TDE01 OS Command Injection |
|---|
| 描述 | An OS command injection vulnerability exists in the formAddMacfilterRule function in /bin/httpd of Tenda AC10 V4 firmware V16.03.10.10. User-controlled input from websGetVar() is passed to doSystemCmd() without adequate sanitization. Dataflow analysis confirms exploitable paths at 0x0044d47c and 0x0044d4a4. A total of 21 functions follow the same vulnerable pattern including formDelMacfilterRule, formSetFirewallCfg, formWifiApScan, and form_fast_setting_internet_set. An authenticated attacker can inject arbitrary OS commands resulting in root-level code execution. |
|---|
| 来源 | ⚠️ https://github.com/somanyerrors/tenda-ac10v4-vulnerabilities/blob/main/findings/CRITICAL-03-command-injection-formaddmacfilterrule.md |
|---|
| 用户 | CoreNode (UID 96566) |
|---|
| 提交 | 2026-03-18 16時23分 (1 月前) |
|---|
| 管理 | 2026-04-04 15時28分 (17 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 355311 [Tenda AC10 16.03.10.10_multi_TDE01 /bin/httpd formAddMacfilterRule 权限提升] |
|---|
| 积分 | 20 |
|---|