Skip to main content

CVE-2023-27076: n/a in n/a

Critical
VulnerabilityCVE-2023-27076cvecve-2023-27076
Published: Mon Apr 10 2023 (04/10/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Command injection vulnerability found in Tenda G103 v.1.0.0.5 allows attacker to execute arbitrary code via a the language parameter.

AI-Powered Analysis

AILast updated: 07/03/2025, 12:40:51 UTC

Technical Analysis

CVE-2023-27076 is a critical command injection vulnerability identified in the Tenda G103 router firmware version 1.0.0.5. The vulnerability arises from improper input validation of the 'language' parameter, which allows an unauthenticated remote attacker to inject arbitrary commands into the system. This flaw is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that the input is directly passed to a command shell without adequate sanitization. Exploiting this vulnerability requires no authentication or user interaction, and the attacker can execute arbitrary code with the privileges of the affected device, potentially leading to full compromise. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation over a network. Although no known exploits are currently reported in the wild, the severity and simplicity of exploitation make this a significant threat. The lack of vendor or product details beyond the Tenda G103 model limits the scope of affected devices, but given Tenda's market presence in consumer and small business networking equipment, the vulnerability could be widespread in environments using this router model. The absence of an official patch at the time of publication further increases risk exposure.

Potential Impact

For European organizations, particularly small and medium enterprises or home office environments relying on Tenda G103 routers, this vulnerability poses a severe risk. Successful exploitation can lead to unauthorized remote control of network infrastructure, enabling attackers to intercept, manipulate, or disrupt network traffic. This can compromise sensitive data confidentiality, integrity, and availability of network services. Additionally, compromised routers can be leveraged as footholds for lateral movement within corporate networks or as platforms for launching further attacks such as distributed denial-of-service (DDoS). The critical nature of the vulnerability and the lack of authentication requirements mean that attackers can easily target exposed devices, potentially leading to widespread disruption. Given the increasing reliance on remote work and home networking in Europe, this vulnerability could impact business continuity and data protection compliance, especially under regulations like GDPR.

Mitigation Recommendations

Immediate mitigation steps include isolating affected Tenda G103 devices from untrusted networks and restricting remote management access. Network administrators should implement strict firewall rules to block inbound traffic to router management interfaces, particularly from the internet. Monitoring network traffic for unusual command injection patterns or unexpected outbound connections from routers can help detect exploitation attempts. Since no official patch is available, users should consider replacing vulnerable devices with updated hardware or firmware versions from trusted vendors. If possible, disabling the vulnerable 'language' parameter functionality or any web interface features that accept user input without validation can reduce risk. Organizations should also enforce network segmentation to limit the impact of a compromised router and maintain regular backups of configuration settings. Keeping abreast of vendor advisories for patches or firmware updates is essential for long-term remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-02-27T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc52c

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 12:40:51 PM

Last updated: 8/14/2025, 8:22:35 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats