OS Command Injection Vulnerability in Tenda AC10U Router
CVE-2024-2853
Key Information:
Badges
Summary
A severe vulnerability has been identified in the Tenda AC10U router, specifically within the formSetSambaConf function of the /goform/setsambacfg file. This security flaw enables an attacker to manipulate the usbName argument, which can result in OS command injection. The attack can be initiated remotely, making it particularly dangerous for users. Despite early disclosure attempts to Tenda, the vendor has not responded to address this critical issue. As the vulnerability is publicly disclosed, it poses a significant risk to all users of affected versions 15.03.06.48 and 15.03.06.49.
Affected Version(s)
AC10U 15.03.06.48
AC10U 15.03.06.49
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved