CVE-2026-5338
Received Received - Intake
Remote Command Injection in Tenda G103 Setting Handler

Publication date: 2026-04-02

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security vulnerability has been detected in Tenda G103 1.0.0.5. The affected element is the function action_set_system_settings of the file system.lua of the component Setting Handler. Such manipulation of the argument lanIp leads to command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tenda g103_firmware 1.0.0.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated attackers to perform command injection with root privileges on the affected Tenda G103 device, potentially leading to full device compromise.

Such a compromise could result in unauthorized access to sensitive data or disruption of device functionality, which may impact compliance with standards and regulations like GDPR or HIPAA that require protection of personal and sensitive information.

However, the provided information does not explicitly detail the direct effects on compliance with these standards.


Can you explain this vulnerability to me?

CVE-2026-5338 is a command injection vulnerability found in the Tenda G103 GPON optical network terminals, specifically in the function action_set_system_settings within the system.lua file.

The vulnerability arises because the lanIp parameter is not properly sanitized before being used in system commands. This allows an authenticated attacker to inject arbitrary shell commands by including special characters like backticks, semicolons, or logical AND operators in the lanIp argument.

Exploiting this flaw enables execution of commands with root privileges, potentially compromising the entire device. The attack requires valid authentication tokens and cookies, meaning only authenticated users can perform it.


How can this vulnerability impact me? :

This vulnerability can lead to full device compromise because attackers can execute arbitrary commands with root privileges on the affected Tenda G103 device.

An attacker who successfully exploits this flaw can manipulate system settings, install malware, disrupt network operations, or gain persistent unauthorized access.

Since the attack requires authentication, it mainly impacts users or administrators with access credentials, but the consequences can be severe including loss of control over the device and potential network security breaches.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to exploit the command injection in the lanIp parameter of the action_set_system_settings function. A common detection method is to send a crafted POST request to the endpoint /cgi-bin/luci/;stok=<session_token>/admin/system/set_system_settings with a payload that includes shell metacharacters to test for command injection.

  • Send a POST request with payload: lanIp=1`touch$IFS/tmp/setting.txt` to check if the file /tmp/setting.txt is created on the device.
  • Verify the presence of the /tmp/setting.txt file on the device to confirm successful command injection.

Note that exploitation requires valid authentication tokens and cookies, so detection commands must be run with authenticated access.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-5338 vulnerability, immediate steps include restricting access to the affected Tenda G103 device to trusted and authenticated users only, as exploitation requires valid authentication tokens.

Avoid exposing the device's management interface to untrusted networks or the internet to reduce the risk of remote exploitation.

Monitor and review authentication logs for suspicious activity that could indicate attempts to exploit the command injection vulnerability.

Apply any available patches or updates from the vendor that address the improper sanitization of the lanIp parameter in the system.lua file.

If patches are not available, consider implementing network-level controls such as firewall rules to limit access to the vulnerable endpoint.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart