CVE-2026-6989
Remote Command Injection in Tenda F453 Telnet Service
Publication date: 2026-04-25
Last updated on: 2026-04-30
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tenda | f453_firmware | 1.0.0.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability affects the Tenda F453 router, specifically the Telnet Service component through the TendaTelnet function located at the /goform/telnet HTTP endpoint.
This function is intended to control the router's Telnet service by executing system commands to enable and start Telnet. However, it lacks proper access control, input validation, and security checks.
An attacker can send a crafted HTTP POST request to the /goform/telnet endpoint, which triggers the function and enables the Telnet service without authorization.
Once Telnet is enabled, the attacker can connect remotely via Telnet and gain interactive shell access, allowing arbitrary system command execution on the device.
How can this vulnerability impact me? :
This vulnerability allows remote attackers to execute arbitrary system commands on the affected router without authorization.
- Attackers can gain persistent access to the device.
- They can tamper with the router's configuration.
- It enables lateral movement within the network, potentially compromising other connected devices.
Overall, this can lead to severe security breaches including loss of control over the router and network.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for unauthorized HTTP POST requests sent to the endpoint /goform/telnet on the Tenda F453 router. Such requests may indicate attempts to exploit the command injection flaw by enabling the Telnet service remotely.
A practical detection method is to capture and analyze network traffic for POST requests targeting /goform/telnet. Additionally, checking if the Telnet service is unexpectedly enabled on the router can be an indicator of compromise.
- Use network monitoring tools like tcpdump or Wireshark to filter HTTP POST requests to /goform/telnet, for example: tcpdump -i <interface> 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)'
- Check if the Telnet port (usually port 23) is open on the router using: nmap -p 23 <router_ip>
- Attempt to connect to the Telnet service to verify if it is enabled: telnet <router_ip> 23
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting or disabling access to the /goform/telnet endpoint to prevent unauthorized triggering of the Telnet service.
It is also critical to ensure that authentication and authorization checks are in place for any management functions exposed by the router.
Users should check for and apply any firmware updates released by the vendor that patch this vulnerability.
- Block or filter HTTP POST requests to /goform/telnet at the network perimeter or router firewall.
- Disable the Telnet service on the router if it is not needed.
- Monitor router logs and network traffic for suspicious activity related to Telnet service activation.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthorized remote command execution on the Tenda F453 router by enabling Telnet access without authentication. This can lead to unauthorized access, configuration tampering, persistence on the device, and lateral movement within the network.
Such unauthorized access and potential data breaches could negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data, secure access controls, and audit logging.
However, the provided information does not explicitly mention compliance impacts or specific regulatory considerations.