Description
A vulnerability was determined in Tenda HG3 2.0. This vulnerability affects the function formTracert of the file /boaform/formTracert. Executing a manipulation of the argument datasize can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Published: 2026-04-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Command Injection Leading to Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in the formTracert endpoint of the Tenda HG3 router allows an attacker to manipulate the datasize argument and execute arbitrary shell commands. The vulnerability is a classic command injection, enabling the attacker to gain full control of the device. This can lead to additional compromise of the network, data exfiltration, or use of the router as a pivot point.

Affected Systems

The affected equipment is the Tenda HG3 router, specifically firmware version 2.0. The issue resides in the web management interface located at /boaform/formTracert.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity. The EPSS score is not available, but the vulnerability is publicly disclosed and can be exploited remotely. Since it is not listed in the CISA KEV catalog, the risk is largely determined by its high severity and the lack of known mitigations; attackers can readily craft payloads targeting the datasize parameter to achieve remote code execution.

Generated by OpenCVE AI on April 28, 2026 at 19:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Tenda that removes the command injection flaw in the formTracert interface.
  • If an update is not immediately available, block or restrict access to the /boaform/formTracert endpoint using firewall rules or by disabling WAN side management in the router’s configuration.
  • Configure network segmentation so that the router’s management interface is reachable only from trusted internal hosts, preventing external attackers from reaching the vulnerable endpoint.
  • Continuously monitor router logs for anomalous tracert command executions or unexpected shell activity, and alert on suspicious events.

Generated by OpenCVE AI on April 28, 2026 at 19:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda hg3 Firmware
CPEs cpe:2.3:h:tenda:hg3:2.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:hg3_firmware:300003070:*:*:*:*:*:*:*
Vendors & Products Tenda hg3 Firmware

Tue, 28 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda hg3
Vendors & Products Tenda
Tenda hg3

Mon, 27 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda HG3 2.0. This vulnerability affects the function formTracert of the file /boaform/formTracert. Executing a manipulation of the argument datasize can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Title Tenda HG3 formTracert command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-28T14:35:44.664Z

Reserved: 2026-04-26T20:17:52.059Z

Link: CVE-2026-7160

cve-icon Vulnrichment

Updated: 2026-04-28T13:39:59.672Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-27T22:16:18.690

Modified: 2026-04-30T18:23:30.173

Link: CVE-2026-7160

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:45:07Z

Weaknesses