Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25857: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Tenda Technology Tenda G300-F

0
High
VulnerabilityCVE-2026-25857cvecve-2026-25857cwe-78
Published: Sat Feb 07 2026 (02/07/2026, 21:41:41 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Tenda Technology
Product: Tenda G300-F

Description

CVE-2026-25857 is a high-severity OS command injection vulnerability in the WAN diagnostic functionality of Shenzhen Tenda Technology's G300-F router firmware version 16. 01. 14. 2 and earlier. The vulnerability arises because the router's firmware constructs a shell command invoking curl that incorporates attacker-controlled input without proper sanitization, allowing remote attackers with management interface access to execute arbitrary commands with management process privileges. Exploitation requires no user interaction but does require high privileges on the management interface, which is typically protected but may be exposed in some deployments. There are no known public exploits yet, and no patches have been published. European organizations using this router model, especially in countries with higher Tenda market penetration or critical infrastructure relying on these devices, could face significant risks including device takeover and network compromise. Mitigation involves restricting management interface access, network segmentation, and monitoring for suspicious WAN diagnostic requests until a firmware update is available.

AI-Powered Analysis

AILast updated: 02/07/2026, 22:15:19 UTC

Technical Analysis

CVE-2026-25857 is an OS command injection vulnerability classified under CWE-78 affecting the WAN diagnostic functionality (formSetWanDiag) of Shenzhen Tenda Technology's G300-F router firmware version 16.01.14.2 and prior. The vulnerability stems from improper neutralization of special elements in the construction of a shell command that invokes curl. Specifically, the firmware incorporates attacker-controlled input directly into the command line without adequate sanitization or escaping, enabling an attacker with access to the router's management interface to inject arbitrary shell syntax. This injection allows execution of arbitrary commands with the privileges of the management process, which typically has elevated rights on the device. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require the attacker to have high privileges on the management interface, which may be protected by authentication but could be exposed due to misconfiguration or weak credentials. The CVSS v4.0 score is 8.6 (high severity), reflecting the network attack vector, low attack complexity, no required privileges beyond management interface access, and high impact on confidentiality, integrity, and availability. No patches or known exploits are currently available, increasing the urgency for defensive measures. The vulnerability could lead to full device compromise, enabling attackers to manipulate network traffic, pivot into internal networks, or disrupt services.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for those using Tenda G300-F routers in their network infrastructure. Successful exploitation could lead to complete device compromise, allowing attackers to intercept or redirect network traffic, deploy malware, or establish persistent footholds within corporate or critical infrastructure networks. This could result in data breaches, service disruptions, and loss of network integrity. Organizations in sectors such as telecommunications, government, finance, and critical infrastructure are especially at risk due to the potential for attackers to leverage compromised routers as entry points for broader network attacks. The lack of available patches means that vulnerable devices remain exposed, increasing the window of opportunity for attackers. Additionally, if management interfaces are exposed to the internet or poorly segmented, the likelihood of exploitation increases. The impact extends beyond individual organizations to potentially affect national cybersecurity postures if widely deployed devices are compromised.

Mitigation Recommendations

1. Immediately restrict access to the router's management interface by limiting it to trusted internal networks and disabling remote management if not strictly necessary. 2. Implement strong authentication mechanisms for the management interface, including complex passwords and, if supported, multi-factor authentication. 3. Segment networks to isolate management interfaces from general user and internet-facing networks, reducing exposure. 4. Monitor network traffic for unusual or suspicious WAN diagnostic requests or command injection patterns targeting the router. 5. Regularly audit router configurations to ensure no unintended exposure of management interfaces. 6. Engage with Shenzhen Tenda Technology for firmware updates or patches addressing this vulnerability and plan prompt deployment once available. 7. Consider replacing vulnerable devices with models from vendors with robust security track records if patches are delayed. 8. Educate network administrators about the risks of exposing management interfaces and the importance of secure configurations. 9. Employ network intrusion detection systems (NIDS) tuned to detect exploitation attempts targeting this vulnerability. 10. Maintain an incident response plan to quickly isolate and remediate compromised devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-06T19:12:03.462Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6987b5ecf9fa50a62fd2db04

Added to database: 2/7/2026, 10:00:12 PM

Last enriched: 2/7/2026, 10:15:19 PM

Last updated: 2/8/2026, 3:35:06 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats