Impact
Command injection is present in the formSetUSBPartitionUmount function of Tenda W30E firmware; a crafted usbPartitionName value can be used to inject and execute arbitrary commands on the device. This flaw enables attackers with network access to the router’s management interface to run commands with the privileges of the device, potentially compromising the entire network or allowing further lateral movement.
Affected Systems
The vulnerability affects devices running Tenda W30E firmware version V2.0 V16.01.0.21. No other vendors or product versions are listed as affected.
Risk and Exploitability
The CVSS score is not published, but the capability to execute arbitrary commands suggests a high severity rating. EPSS data is not available and the flaw is not currently listed in CISA KEV, indicating no confirmed exploits yet. Attackers would need to reach the router’s web interface, likely from a local network or through compromised credentials, to exploit the flaw. No official patch or workaround has been released at this time.
OpenCVE Enrichment