Ad

CVE-2026-5339

MEDIUM CVSS 4.0: 5.1 EPSS 0.14%
Updated Apr 06, 2026
Tenda
Parameter Value
CVSS 5.1 (MEDIUM)
Type CWE-77 (Command Injection), CWE-74 (Injection)
Vendor Tenda
Public PoC No

A vulnerability was detected in Tenda G103 1.0.0.5. The impacted element is the function action_set_net_settings of the file gpon.lua of the component Setting Handler. Performing a manipulation of the argument authLoid/authLoidPassword/authPassword/authSerialNo/authType/oltType/usVlanId/usVlanPriority results in command injection.

It is possible to initiate the attack remotely. The exploit is now public and may be used.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
High
Admin privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
Low
Partial data leak
Integrity
Low
Partial data modification
Availability
Low
Partial disruption

CVSS Vector v4.0

Vulnerable Products 2

Configuration From (including) Up to (excluding)
Tenda G103_Firmware
cpe:2.3:o:tenda:g103_firmware:1.0.0.5:*:*:*:*:*:*:*
Tenda G103
cpe:2.3:h:tenda:g103:-:*:*:*:*:*:*:*