Home

Description

A security vulnerability has been detected in Tenda G103 1.0.0.5. The affected element is the function action_set_system_settings of the file system.lua of the component Setting Handler. Such manipulation of the argument lanIp leads to command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

PUBLISHED Reserved 2026-04-01 | Published 2026-04-02 | Updated 2026-04-02 | Assigner VulDB




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 4.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 4.7CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
5.8AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Command Injection

Injection

Product status

1.0.0.5
affected

Timeline

2026-04-01:Advisory disclosed
2026-04-01:VulDB entry created
2026-04-01:VulDB entry last update

Credits

n0ps1ed (VulDB User) reporter

References

vuldb.com/vuln/354669 (VDB-354669 | Tenda G103 Setting system.lua action_set_system_settings command injection) vdb-entry technical-description

vuldb.com/vuln/354669/cti (VDB-354669 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/781131 (Submit #781131 | Tenda G103 G103_V1.0.0.5 Command Injection) third-party-advisory

github.com/...ree/main/Tenda G103/action_set_system_settings exploit

www.tenda.com.cn/ product

cve.org (CVE-2026-5338)

nvd.nist.gov (CVE-2026-5338)

Download JSON