CVE-2026-1689: Command Injection in Tenda HG10
A vulnerability was detected in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon. The impacted element is the function checkUserFromLanOrWan of the file /boaform/admin/formLogin of the component Login Interface. The manipulation of the argument Host results in command injection. The attack can be launched remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2026-1689 is a command injection vulnerability identified in the Tenda HG10 router firmware version US_HG7_HG9_HG10re_300001138_en_xpon. The vulnerability resides in the checkUserFromLanOrWan function of the /boaform/admin/formLogin component, which handles login requests. Specifically, the Host argument passed to this function is not properly sanitized, allowing an attacker to inject arbitrary shell commands. This flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The vulnerability enables an attacker to execute arbitrary commands on the device with the privileges of the web server process, potentially leading to full device compromise, unauthorized network access, or pivoting to internal networks. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no patches or official fixes have been published yet, a public exploit is available, increasing the risk of exploitation. The affected product is primarily deployed as a home or small office gateway device, often providing internet access and routing capabilities. The vulnerability's exploitation could allow attackers to manipulate network traffic, intercept sensitive data, or disrupt network availability.
Potential Impact
For European organizations, especially small businesses and residential users relying on Tenda HG10 routers, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized control over the router, enabling attackers to intercept or manipulate network traffic, deploy malware, or use the compromised device as a foothold for further attacks within the internal network. This could result in data breaches, loss of confidentiality, and potential disruption of internet connectivity. Given the router's role as a network gateway, the impact extends beyond the device itself to the broader network environment. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. Organizations with remote management enabled or exposed router interfaces are particularly vulnerable. The medium CVSS score reflects the balance between the ease of exploitation and the partial impact on system security, but the presence of a public exploit elevates the urgency for mitigation.
Mitigation Recommendations
1. Immediately disable remote management interfaces on affected Tenda HG10 devices to reduce exposure to external attackers. 2. Restrict access to the router's administrative interface to trusted internal networks only, using firewall rules or access control lists. 3. Implement network segmentation to isolate IoT and router devices from critical business systems, limiting lateral movement if compromised. 4. Monitor network traffic for unusual patterns or command injection attempts targeting the login interface. 5. Regularly audit router firmware versions and configurations to identify and replace vulnerable devices. 6. Until an official patch is released, consider replacing affected devices with models from vendors with timely security updates. 7. Educate users on the risks of exposing router management interfaces and encourage strong, unique administrative passwords. 8. Employ intrusion detection/prevention systems capable of detecting command injection attempts on network devices. 9. Follow vendor communications closely for patch releases and apply updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2026-1689: Command Injection in Tenda HG10
Description
A vulnerability was detected in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon. The impacted element is the function checkUserFromLanOrWan of the file /boaform/admin/formLogin of the component Login Interface. The manipulation of the argument Host results in command injection. The attack can be launched remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2026-1689 is a command injection vulnerability identified in the Tenda HG10 router firmware version US_HG7_HG9_HG10re_300001138_en_xpon. The vulnerability resides in the checkUserFromLanOrWan function of the /boaform/admin/formLogin component, which handles login requests. Specifically, the Host argument passed to this function is not properly sanitized, allowing an attacker to inject arbitrary shell commands. This flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The vulnerability enables an attacker to execute arbitrary commands on the device with the privileges of the web server process, potentially leading to full device compromise, unauthorized network access, or pivoting to internal networks. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no patches or official fixes have been published yet, a public exploit is available, increasing the risk of exploitation. The affected product is primarily deployed as a home or small office gateway device, often providing internet access and routing capabilities. The vulnerability's exploitation could allow attackers to manipulate network traffic, intercept sensitive data, or disrupt network availability.
Potential Impact
For European organizations, especially small businesses and residential users relying on Tenda HG10 routers, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized control over the router, enabling attackers to intercept or manipulate network traffic, deploy malware, or use the compromised device as a foothold for further attacks within the internal network. This could result in data breaches, loss of confidentiality, and potential disruption of internet connectivity. Given the router's role as a network gateway, the impact extends beyond the device itself to the broader network environment. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. Organizations with remote management enabled or exposed router interfaces are particularly vulnerable. The medium CVSS score reflects the balance between the ease of exploitation and the partial impact on system security, but the presence of a public exploit elevates the urgency for mitigation.
Mitigation Recommendations
1. Immediately disable remote management interfaces on affected Tenda HG10 devices to reduce exposure to external attackers. 2. Restrict access to the router's administrative interface to trusted internal networks only, using firewall rules or access control lists. 3. Implement network segmentation to isolate IoT and router devices from critical business systems, limiting lateral movement if compromised. 4. Monitor network traffic for unusual patterns or command injection attempts targeting the login interface. 5. Regularly audit router firmware versions and configurations to identify and replace vulnerable devices. 6. Until an official patch is released, consider replacing affected devices with models from vendors with timely security updates. 7. Educate users on the risks of exposing router management interfaces and encourage strong, unique administrative passwords. 8. Employ intrusion detection/prevention systems capable of detecting command injection attempts on network devices. 9. Follow vendor communications closely for patch releases and apply updates promptly once available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-30T07:56:21.633Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 697cdf88ac0632022265629a
Added to database: 1/30/2026, 4:42:48 PM
Last enriched: 1/30/2026, 4:57:22 PM
Last updated: 1/30/2026, 6:06:30 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1700: Cross Site Scripting in projectworlds House Rental and Property Listing
MediumCVE-2026-1691: Deserialization in bolo-solo
MediumCVE-2026-1690: Command Injection in Tenda HG10
MediumCVE-2026-1688: SQL Injection in itsourcecode Directory Management System
MediumCVE-2026-1687: Command Injection in Tenda HG10
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.