Description
A vulnerability was detected in Tenda G103 1.0.0.5. The impacted element is the function action_set_net_settings of the file gpon.lua of the component Setting Handler. Performing a manipulation of the argument authLoid/authLoidPassword/authPassword/authSerialNo/authType/oltType/usVlanId/usVlanPriority results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Problem types
Product status
Timeline
| 2026-04-01: | Advisory disclosed |
| 2026-04-01: | VulDB entry created |
| 2026-04-01: | VulDB entry last update |
Credits
n0ps1ed (VulDB User)
References
vuldb.com/vuln/354670 (VDB-354670 | Tenda G103 Setting gpon.lua action_set_net_settings command injection)
vuldb.com/vuln/354670/cti (VDB-354670 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/781132 (Submit #781132 | Tenda G103 G103_V1.0.0.5 Command Injection)
vuldb.com/submit/781133 (Submit #781133 | Tenda G103 G103_V1.0.0.5 Command Injection (Duplicate))
vuldb.com/submit/781134 (Submit #781134 | Tenda G103 G103_V1.0.0.5 Command Injection (Duplicate))
vuldb.com/submit/781135 (Submit #781135 | Tenda G103 G103_V1.0.0.5 Command Injection (Duplicate))
vuldb.com/submit/781142 (Submit #781142 | Tenda G103 G103_V1.0.0.5 Command Injection (Duplicate))
vuldb.com/submit/781143 (Submit #781143 | Tenda G103 G103_V1.0.0.5 Command Injection (Duplicate))
vuldb.com/submit/781144 (Submit #781144 | Tenda G103 G103_V1.0.0.5 Command Injection (Duplicate))
vuldb.com/submit/781145 (Submit #781145 | Tenda G103 G103_V1.0.0.5 Command Injection (Duplicate))
github.com/ZZ2266/.github.io/tree/main/Tenda G103/authLoid
www.tenda.com.cn/