CVE-2026-1689
📋 TL;DR
This CVE describes a remote command injection vulnerability in Tenda HG10 routers. Attackers can execute arbitrary commands on affected devices by manipulating the Host parameter in the login interface. This affects Tenda HG10 routers with specific firmware versions.
💻 Affected Systems
- Tenda HG10
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attacker to install persistent backdoors, intercept network traffic, pivot to internal networks, or brick the device.
Likely Case
Unauthorized access to router configuration, credential theft, DNS hijacking, or launching attacks against internal devices.
If Mitigated
Limited impact if device is behind firewall with restricted WAN access and proper network segmentation.
🎯 Exploit Status
Public proof-of-concept available on GitHub. Exploitation requires no authentication and uses simple command injection.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
Check Tenda official website for firmware updates. If update available, download and flash via web interface.
🔧 Temporary Workarounds
Network Isolation
allPlace affected routers behind firewalls with strict inbound rules
Access Restriction
linuxRestrict administrative interface access to trusted IPs only
iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
🧯 If You Can't Patch
- Replace affected devices with supported models from different vendors
- Implement network segmentation to isolate router management traffic
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router web interface. If version matches affected range, device is vulnerable.
Check Version:
curl -s http://router-ip/ | grep -i firmware || ssh admin@router 'cat /proc/version'
Verify Fix Applied:
Verify firmware has been updated to version not in affected range. Test with known safe payloads.
📡 Detection & Monitoring
Log Indicators:
- Unusual commands in system logs
- Failed login attempts with suspicious Host headers
- Unexpected process execution
Network Indicators:
- Unusual outbound connections from router
- DNS queries to malicious domains
- Port scanning originating from router
SIEM Query:
source="router.log" AND ("formLogin" OR "Host:" AND ("|" OR ";" OR "`"))
🔗 References
- https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formLogin-Host-command.md
- https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formLogin-Host-command.md#poc
- https://vuldb.com/?ctiid.343483
- https://vuldb.com/?id.343483
- https://vuldb.com/?submit.741411
- https://www.tenda.com.cn/