Home

Description

A vulnerability was detected in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon. The impacted element is the function checkUserFromLanOrWan of the file /boaform/admin/formLogin of the component Login Interface. The manipulation of the argument Host results in command injection. The attack can be launched remotely. The exploit is now public and may be used.

PUBLISHED Reserved 2026-01-30 | Published 2026-01-30 | Updated 2026-02-23 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
HIGH: 7.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
HIGH: 7.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
7.5AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Command Injection

Injection

Product status

US_HG7_HG9_HG10re_300001138_en_xpon
affected

Timeline

2026-01-30:Advisory disclosed
2026-01-30:VulDB entry created
2026-01-31:VulDB entry last update

Credits

Abcd1234 (VulDB User) reporter

References

vuldb.com/?id.343483 (VDB-343483 | Tenda HG10 Login formLogin checkUserFromLanOrWan command injection) vdb-entry technical-description

vuldb.com/?ctiid.343483 (VDB-343483 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.741411 (Submit #741411 | Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injection) third-party-advisory

github.com/...blob/main/Tenda/HG10/formLogin-Host-command.md related

github.com/...blob/main/Tenda/HG10/formLogin-Host-command.md exploit

www.tenda.com.cn/ product

cve.org (CVE-2026-1689)

nvd.nist.gov (CVE-2026-1689)

Download JSON