Description
A flaw has been found in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. This issue affects the function formRoute of the file /boaform/formRouting of the component Boa Service. This manipulation of the argument nextHop causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Published: 2026-04-25
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via buffer overflow in Boa Service
Action: Apply Patch
AI Analysis

Impact

A buffer overflow occurs when the Boa Service processes the nextHop argument in the formRouting form. The vulnerability resides in the formRoute function of /boaform/formRouting within the Tenda HG10 firmware. Because the overflow is triggered by crafted input, an attacker can control memory and potentially execute arbitrary code, resulting in full system compromise. The CVSS score of 8.7 indicates high severity and the description confirms that the exploit is publicly available.

Affected Systems

The flaw affects the Tenda HG10 device running firmware build HG7_HG9_HG10re_300001138_en_xpon. Users employing this model are at risk if they remain on that firmware version.

Risk and Exploitability

Given the CVSS of 8.7 and an EPSS score of less than 1%, the technical severity is high but the probability of widespread exploitation remains low at this time. The vulnerability is not listed in CISA's KEV catalog. The attack vector is remote, allowing an adversary to send malicious requests to the affected Boa Service endpoint. Since the exploit has been published, a determined attacker could achieve remote code execution from a network exposed to the device.

Generated by OpenCVE AI on April 28, 2026 at 05:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Tenda that fixes the Boa Service buffer overflow.
  • If an update is not yet available, block external access to the Boa Service by configuring firewall rules to allow traffic only from trusted internal hosts.
  • If the Boa Service is not required, disable or uninstall it to eliminate the attack surface.

Generated by OpenCVE AI on April 28, 2026 at 05:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:hg10:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:hg10_firmware:300001138:*:*:*:*:*:*:*

Mon, 27 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda hg10
Vendors & Products Tenda hg10

Mon, 27 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 25 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. This issue affects the function formRoute of the file /boaform/formRouting of the component Boa Service. This manipulation of the argument nextHop causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Title Tenda HG10 Boa Service formRouting formRoute buffer overflow
First Time appeared Tenda
Tenda hg10 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:hg10_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda hg10 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Hg10 Hg10 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T14:07:53.405Z

Reserved: 2026-04-24T19:23:13.271Z

Link: CVE-2026-6988

cve-icon Vulnrichment

Updated: 2026-04-27T14:07:48.487Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-25T18:16:17.863

Modified: 2026-04-30T14:10:15.160

Link: CVE-2026-6988

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:45:23Z

Weaknesses