CVE-2026-38834
Command Injection in Tenda W30E do_ping_action Function
Publication date: 2026-04-21
Last updated on: 2026-04-27
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tenda | w30e_firmware | 16.01.0.21 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-38834 is a command injection vulnerability found in the Tenda W30EV2.0 router running firmware version V16.01.0.21. The vulnerability exists in the function called do_ping_action and is exploitable via the hostName parameter.
An attacker can send a specially crafted HTTP POST request to the router's endpoint with a manipulated hostName field that is passed unsanitized to the do_ping_action function. This allows the attacker to inject and execute arbitrary shell commands on the device.
For example, an attacker can append arbitrary text to files on the router by injecting commands, demonstrating full command execution capability with the privileges of the affected service.
How can this vulnerability impact me? :
This vulnerability allows remote attackers to execute arbitrary commands on the affected router with the privileges of the service running the vulnerable function.
As a result, an attacker could potentially take full control of the device, modify its configuration, alter files, disrupt network traffic, or use the device as a foothold to launch further attacks within the network.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by sending a crafted HTTP POST request to the router's endpoint /goform/module?1774630088898 with a JSON payload that manipulates the hostName parameter to inject commands.
A proof of concept involves injecting a command that appends a string to a file on the device, such as: 192.168.1.1 -c 3 echo pwned!!!!>>/webroot_ro/index.html ping 192.168.1.1
Detection can be performed by monitoring for such HTTP POST requests targeting the vulnerable endpoint or by checking if the file /webroot_ro/index.html contains unexpected content like "pwned!!!!" indicating command execution.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the CVE-2026-38834 vulnerability in the Tenda W30EV2.0 router running firmware V16.01.0.21, immediate steps include:
- Avoid exposing the router's management interface to untrusted networks to reduce the risk of remote exploitation.
- Restrict access to the router's internal IP address and ensure only trusted devices can send requests.
- Monitor network traffic for suspicious POST requests targeting the endpoint `/goform/module?1774630088898` with JSON payloads manipulating the `hostName` parameter.
- Check the vendor's website or firmware download page for any available patches or firmware updates addressing this vulnerability.
- If a patch is available, apply the firmware update promptly to fix the command injection flaw.
- As a temporary measure, consider disabling or restricting the vulnerable functionality if possible.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The CVE-2026-38834 vulnerability allows remote attackers to execute arbitrary commands on the Tenda W30EV2.0 router with the privileges of the affected service, potentially leading to full device compromise.
Such a compromise could result in unauthorized access to sensitive data or disruption of network services, which may impact compliance with common standards and regulations like GDPR and HIPAA that require protection of personal and health information.
However, the provided information does not explicitly detail the direct effects on compliance or specific regulatory impacts.