Description
A flaw has been found in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon. This affects the function system of the file /boaform/formSysCmd. This manipulation of the argument sysCmd causes command injection. The attack may be initiated remotely. The exploit has been published and may be used.
Published: 2026-01-30
Score: 5.1 Medium
EPSS: 1.1% Low
KEV: No
Impact: Remote Command Execution
Action: Apply patch
AI Analysis

Impact

A vulnerability in the Tenda HG10 router's web interface at /boaform/formSysCmd lets attackers inject arbitrary system commands through the sysCmd parameter. The lack of input validation means the commands run with device privileges. The flaw is publicly documented and can be triggered from outside the network.

Affected Systems

The affected vendor is Tenda, model HG10 routers. Firmware versions include US_HG7_HG9_HG10re_300001138_en_xpon, and any related builds that expose the same vulnerable endpoint. Identified CPEs show this impact across Tenda HG10 hardware and firmware families.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate impact, while an EPSS score of 1% suggests low but nonzero likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely through the router's web interface, sending a crafted sysCmd parameter that executes system commands on the device. Because the command injection is unfiltered, an attacker could gain full control of the router, enabling lateral movement and other attacks within the user’s network.

Generated by OpenCVE AI on April 18, 2026 at 01:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to a firmware version that removes the command injection vulnerability in /boaform/formSysCmd.
  • If an update is not immediately available, block or disable access to the /boaform/formSysCmd endpoint, such as by configuring the router’s firewall or disabling remote administration.
  • Change the default administrative password and restrict administrative access to trusted IP addresses to limit potential exposure.

Generated by OpenCVE AI on April 18, 2026 at 01:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tenda:hg10_firmware:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda hg10 Firmware
CPEs cpe:2.3:h:tenda:hg10:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:hg10_firmware:-:*:*:*:*:*:*:*
Vendors & Products Tenda hg10 Firmware

Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda hg10
Vendors & Products Tenda
Tenda hg10

Fri, 30 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon. This affects the function system of the file /boaform/formSysCmd. This manipulation of the argument sysCmd causes command injection. The attack may be initiated remotely. The exploit has been published and may be used.
Title Tenda HG10 formSysCmd system command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Hg10 Hg10 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:10:09.575Z

Reserved: 2026-01-30T07:57:40.795Z

Link: CVE-2026-1690

cve-icon Vulnrichment

Updated: 2026-01-30T16:53:45.547Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-30T17:16:13.970

Modified: 2026-02-10T14:34:50.513

Link: CVE-2026-1690

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:15:05Z

Weaknesses