Impact
A flaw in the action_set_net_settings function of the gpon.lua handler in Tenda G103 firmware allows an attacker to inject arbitrary shell commands. By supplying specially crafted values for parameters such as authLoid, authPassword, and US VLAN identifiers, the device can execute commands supplied by the attacker. This vulnerability enables remote exploitation with potential to compromise confidentiality, integrity, and availability of the device and any network resources to which it connects. The weakness corresponds to CWE-74 (OS Command Injection) and CWE-77 (Command Injection).
Affected Systems
The affected system is the Tenda G103 router, running firmware version 1.0.0.5. No other versions or variants are reported as vulnerable in the provided data.
Risk and Exploitability
The CVSS score for this issue is 5.1, indicating a medium severity. EPSS data is not available, and the vulnerability is not listed in CISA’s KEV catalog. The publicly available exploit can be launched remotely by sending crafted HTTP requests to the router, likely over the network interface exposed to the attacker. No authentication requirements are detailed in the description, suggesting the API may be reachable without credentials, but the precise prerequisites are not explicitly stated.
OpenCVE Enrichment