Description
A vulnerability has been found in Tenda AC10 16.03.10.10_multi_TDE01. Affected is the function formAddMacfilterRule of the file /bin/httpd. Such manipulation leads to os command injection. It is possible to launch the attack remotely. Multiple endpoints might be affected.
Published: 2026-04-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via OS Command Injection
Action: Patch
AI Analysis

Impact

A flaw in the formAddMacfilterRule handler of /bin/httpd in Tenda AC10 firmware 16.03.10.10_multi_TDE01 allows an attacker to inject arbitrary system commands through manipulated input. This results in command injection that can be executed with the privileges of the httpd process, potentially providing full control over the device.

Affected Systems

The vulnerability is specific to Tenda AC10 routers running firmware 16.03.10.10_multi_TDE01, as identified by the vendor and the associated CPE string. All configuration endpoints that expose the formAddMacfilterRule function may be impacted; no other products have been reported to be affected.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely via the device’s web management interface. Once leveraged, an attacker could execute commands on the router, compromising confidentiality, integrity, and availability of the device. Because the vulnerability remains publicly known and no patch is cited in the advisory, the risk persists for any exposed router.

Generated by OpenCVE AI on April 5, 2026 at 10:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply the latest firmware version released by Tenda that addresses this command injection issue.
  • If a firmware update is not feasible, disable remote management or restrict access to the router’s web interface using firewall rules.
  • Limit local network users from accessing the administrator interface or restrict management IP ranges to trusted subnets.
  • Enable logging on the router and monitor for anomalous command execution or configuration changes.
  • Use network segmentation to isolate the router from critical production networks.

Generated by OpenCVE AI on April 5, 2026 at 10:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac10
Vendors & Products Tenda ac10

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 08:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda AC10 16.03.10.10_multi_TDE01. Affected is the function formAddMacfilterRule of the file /bin/httpd. Such manipulation leads to os command injection. It is possible to launch the attack remotely. Multiple endpoints might be affected.
Title Tenda AC10 httpd formAddMacfilterRule os command injection
First Time appeared Tenda
Tenda ac10 Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:tenda:ac10_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac10 Firmware
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Tenda Ac10 Ac10 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T14:51:06.247Z

Reserved: 2026-04-04T13:27:55.189Z

Link: CVE-2026-5547

cve-icon Vulnrichment

Updated: 2026-04-06T14:02:37.237Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-05T08:16:23.390

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5547

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:07Z

Weaknesses