Home

Description

Tenda G300-F router firmware version 16.01.14.2 and prior contain an OS command injection vulnerability in the WAN diagnostic functionality (formSetWanDiag). The implementation constructs a shell command that invokes curl and incorporates attacker-controlled input into the command line without adequate neutralization. As a result, a remote attacker with access to the affected management interface can inject additional shell syntax and execute arbitrary commands on the device with the privileges of the management process.

PUBLISHED Reserved 2026-02-06 | Published 2026-02-07 | Updated 2026-02-10 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

Any version
affected

Credits

evan finder

References

blog.evan.lat/blog/cve-2026-25857/ technical-description exploit

www.tendacn.com/material/show/736333682028613 product

www.vulncheck.com/...-f-command-injection-via-formsetwandiag third-party-advisory

cve.org (CVE-2026-25857)

nvd.nist.gov (CVE-2026-25857)

Download JSON