Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1687: Command Injection in Tenda HG10

0
Medium
VulnerabilityCVE-2026-1687cvecve-2026-1687
Published: Fri Jan 30 2026 (01/30/2026, 16:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: HG10

Description

A weakness has been identified in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon. Impacted is an unknown function of the file /boaform/formSamba of the component Boa Webserver. Executing a manipulation of the argument serverString can lead to command injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

AILast updated: 01/30/2026, 16:27:35 UTC

Technical Analysis

CVE-2026-1687 identifies a command injection vulnerability in the Tenda HG10 router firmware, specifically in the Boa Webserver component's /boaform/formSamba endpoint. The vulnerability arises from insufficient input validation of the serverString parameter, allowing an attacker to inject and execute arbitrary OS commands remotely without authentication or user interaction. This flaw enables attackers to compromise the device, potentially gaining control over the router, intercepting or manipulating network traffic, or pivoting to internal networks. The vulnerability affects the firmware version US_HG7_HG9_HG10re_300001138_en_xpon. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no active exploitation has been reported, a public exploit exists, increasing the risk of future attacks. The Boa Webserver is a lightweight embedded web server commonly used in IoT and networking devices, and vulnerabilities in it can lead to significant device compromise. The lack of available patches at the time of publication necessitates immediate mitigation through network-level controls and monitoring. This vulnerability highlights the risks posed by embedded web servers in consumer and enterprise networking equipment when exposed to the internet or untrusted networks.

Potential Impact

For European organizations, exploitation of CVE-2026-1687 could lead to unauthorized remote control of affected Tenda HG10 routers, resulting in interception or manipulation of sensitive communications, disruption of network availability, and potential lateral movement within corporate networks. This could compromise confidentiality, integrity, and availability of organizational data and services. Critical infrastructure operators and enterprises relying on these devices for network connectivity or segmentation are particularly at risk. The vulnerability's remote, unauthenticated nature increases the attack surface, especially if devices are exposed to the internet or poorly segmented internal networks. The presence of a public exploit raises the likelihood of opportunistic attacks targeting vulnerable devices in Europe. Disruption or compromise of networking equipment could also impact supply chains and service delivery, amplifying the operational impact. Organizations may face regulatory and reputational consequences if breaches occur due to unpatched vulnerabilities in network infrastructure.

Mitigation Recommendations

1. Immediately restrict access to the management interfaces of Tenda HG10 devices by implementing network segmentation and firewall rules to limit exposure to trusted networks only. 2. Monitor network traffic for unusual requests targeting /boaform/formSamba or suspicious command injection patterns. 3. Disable or restrict Samba services if not required to reduce the attack surface. 4. Apply vendor-provided firmware updates or patches as soon as they become available. 5. Conduct an inventory of all Tenda HG10 devices in use and verify firmware versions to identify vulnerable units. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for command injection attempts against embedded web servers. 7. Educate network administrators on the risks of exposed embedded web interfaces and enforce strong authentication and access controls where applicable. 8. Consider replacing outdated or unsupported devices with models that receive regular security updates and have hardened web management interfaces.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-30T07:51:50.019Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697cd880ac06320222633551

Added to database: 1/30/2026, 4:12:48 PM

Last enriched: 1/30/2026, 4:27:35 PM

Last updated: 1/30/2026, 6:21:00 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats