Impact
The Tenda AC21 router is vulnerable to command injection through the dmzIp argument of the /goform/mDMZSetCfg endpoint. Supplying a crafted value allows an attacker to execute arbitrary shell commands on the device. This flaw constitutes a remote code execution vulnerability (CWE-74, CWE-77) that undermines the confidentiality, integrity, and availability of the router and any host behind it.
Affected Systems
Affected devices are Tenda AC21 routers running firmware version 16.03.08.16 or earlier, including the embedded configuration server accessed at 1.1.1.1/1.dmzip. The vendor Tenda cites the AC21 series as impacted.
Risk and Exploitability
The CVSS base score of 5.3 reflects a medium severity, and the EPSS score of less than 1% indicates a low exploitation probability as of the current data. The vulnerability is not listed in the CISA KEV catalog. Attackers can trigger the injection by sending an unauthenticated HTTP request to the exposed internal interface; a publicly available exploit has already been released, so any device with the affected firmware and exposed interface is potentially exploitable.
OpenCVE Enrichment