CVE-2026-38834
Received Received - Intake
Command Injection in Tenda W30E do_ping_action Function

Publication date: 2026-04-21

Last updated on: 2026-04-27

Assigner: MITRE

Description
Tenda W30E V2.0 V16.01.0.21 was found to contain a command injection vulnerability in the do_ping_action function via the hostName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-21
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tenda w30e_firmware 16.01.0.21
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-38834 is a command injection vulnerability found in the Tenda W30EV2.0 router running firmware version V16.01.0.21. The vulnerability exists in the function called do_ping_action and is exploitable via the hostName parameter.

An attacker can send a specially crafted HTTP POST request to the router's endpoint with a manipulated hostName field that is passed unsanitized to the do_ping_action function. This allows the attacker to inject and execute arbitrary shell commands on the device.

For example, an attacker can append arbitrary text to files on the router by injecting commands, demonstrating full command execution capability with the privileges of the affected service.


How can this vulnerability impact me? :

This vulnerability allows remote attackers to execute arbitrary commands on the affected router with the privileges of the service running the vulnerable function.

As a result, an attacker could potentially take full control of the device, modify its configuration, alter files, disrupt network traffic, or use the device as a foothold to launch further attacks within the network.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending a crafted HTTP POST request to the router's endpoint /goform/module?1774630088898 with a JSON payload that manipulates the hostName parameter to inject commands.

A proof of concept involves injecting a command that appends a string to a file on the device, such as: 192.168.1.1 -c 3 echo pwned!!!!>>/webroot_ro/index.html ping 192.168.1.1

Detection can be performed by monitoring for such HTTP POST requests targeting the vulnerable endpoint or by checking if the file /webroot_ro/index.html contains unexpected content like "pwned!!!!" indicating command execution.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-38834 vulnerability in the Tenda W30EV2.0 router running firmware V16.01.0.21, immediate steps include:

  • Avoid exposing the router's management interface to untrusted networks to reduce the risk of remote exploitation.
  • Restrict access to the router's internal IP address and ensure only trusted devices can send requests.
  • Monitor network traffic for suspicious POST requests targeting the endpoint `/goform/module?1774630088898` with JSON payloads manipulating the `hostName` parameter.
  • Check the vendor's website or firmware download page for any available patches or firmware updates addressing this vulnerability.
  • If a patch is available, apply the firmware update promptly to fix the command injection flaw.
  • As a temporary measure, consider disabling or restricting the vulnerable functionality if possible.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The CVE-2026-38834 vulnerability allows remote attackers to execute arbitrary commands on the Tenda W30EV2.0 router with the privileges of the affected service, potentially leading to full device compromise.

Such a compromise could result in unauthorized access to sensitive data or disruption of network services, which may impact compliance with common standards and regulations like GDPR and HIPAA that require protection of personal and health information.

However, the provided information does not explicitly detail the direct effects on compliance or specific regulatory impacts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart