Description
A security vulnerability has been detected in Tenda G103 1.0.0.5. The affected element is the function action_set_system_settings of the file system.lua of the component Setting Handler. Such manipulation of the argument lanIp leads to command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the action_set_system_settings function within the system.lua script of the Tenda G103 router. By manipulating the lanIp parameter, an attacker can inject shell commands, enabling remote execution of arbitrary code. This weakness is classified under CWE-74 and CWE-77 and can lead to full compromise of the device, affecting confidentiality, integrity, and availability. The CVSS score of 5.1 reflects moderate severity due to the need for network access and the potential for severe impact.

Affected Systems

Affected product is the Tenda G103 wireless router running firmware version 1.0.0.5. Only this specific firmware build is known to contain the vulnerable action_set_system_settings function. Users of earlier or later builds are not known to be impacted.

Risk and Exploitability

The publicly disclosed exploit may be executed from a remote network location, and the EPSS score indicates low probability of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog, suggesting limited known active attacks. However, because the flaw allows arbitrary command execution and requires only remote network access, the risk remains significant for exposed routers. Administrators should treat this as a high priority to mitigate potential compromise.

Generated by OpenCVE AI on April 7, 2026 at 23:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to a version that removes the vulnerable action_set_system_settings implementation or to the latest available release.
  • If a firmware upgrade is unavailable, disable remote access to the router's administration interface or restrict it to trusted networks.
  • Review the router's current configuration for improper LAN IP assignments and ensure input parameters are validated or sanitized.
  • Apply strong, unique credentials to the router and periodically audit network devices for unauthorized access.

Generated by OpenCVE AI on April 7, 2026 at 23:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:g103:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:g103_firmware:1.0.0.5:*:*:*:*:*:*:*

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda g103
Vendors & Products Tenda g103
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Tenda G103 1.0.0.5. The affected element is the function action_set_system_settings of the file system.lua of the component Setting Handler. Such manipulation of the argument lanIp leads to command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
Title Tenda G103 Setting system.lua action_set_system_settings command injection
First Time appeared Tenda
Tenda g103 Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:tenda:g103_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda g103 Firmware
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda G103 G103 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-02T18:32:01.034Z

Reserved: 2026-04-01T14:09:08.436Z

Link: CVE-2026-5338

cve-icon Vulnrichment

Updated: 2026-04-02T18:31:56.871Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T14:16:37.403

Modified: 2026-04-07T15:42:43.130

Link: CVE-2026-5338

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:56:27Z

Weaknesses