Impact
The vulnerability is an OS command injection in the formgponConf function of the Tenda HG3 control firmware. By manipulating the fmgpon_loid argument the attacker can inject arbitrary shell commands, allowing execution of code with the privileges of the firmware process. This leads to complete compromise of confidentiality, integrity, and availability of the device and all network services it manages.
Affected Systems
Manufactured by Tenda, the affected product is the HG3 router running firmware version 2.0 300003070. All installations using this build are susceptible.
Risk and Exploitability
The CVSS score of 8.7 classifies the flaw as a high‑severity remote code execution risk. The EPSS score is below 1 % indicating a low probability of exploitation, but a publicly available exploit has already been released and could be employed by motivated adversaries. The vulnerability is not listed in the CISA KEV catalog, yet the remote nature and command‑execution capability demand immediate attention.
OpenCVE Enrichment