CVE-2026-5339

A vulnerability was detected in Tenda G103 1.0.0.5. The impacted element is the function action_set_net_settings of the file gpon.lua of the component Setting Handler. Performing a manipulation of the argument authLoid/authLoidPassword/authPassword/authSerialNo/authType/oltType/usVlanId/usVlanPriority results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
References
Link Resource
https://github.com/ZZ2266/.github.io/tree/main/Tenda%20G103/authLoid Exploit Third Party Advisory
https://vuldb.com/submit/781132 Third Party Advisory VDB Entry
https://vuldb.com/submit/781133 Third Party Advisory VDB Entry
https://vuldb.com/submit/781134 Third Party Advisory VDB Entry
https://vuldb.com/submit/781135 Third Party Advisory VDB Entry
https://vuldb.com/submit/781142 Third Party Advisory VDB Entry
https://vuldb.com/submit/781143 Third Party Advisory VDB Entry
https://vuldb.com/submit/781144 Third Party Advisory VDB Entry
https://vuldb.com/submit/781145 Third Party Advisory VDB Entry
https://vuldb.com/vuln/354670 Third Party Advisory VDB Entry
https://vuldb.com/vuln/354670/cti Permissions Required VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:g103_firmware:1.0.0.5:*:*:*:*:*:*:*
cpe:2.3:h:tenda:g103:-:*:*:*:*:*:*:*

History

06 Apr 2026, 16:07

Type Values Removed Values Added
References () https://github.com/ZZ2266/.github.io/tree/main/Tenda%20G103/authLoid - () https://github.com/ZZ2266/.github.io/tree/main/Tenda%20G103/authLoid - Exploit, Third Party Advisory
References () https://vuldb.com/submit/781132 - () https://vuldb.com/submit/781132 - Third Party Advisory, VDB Entry
References () https://vuldb.com/submit/781133 - () https://vuldb.com/submit/781133 - Third Party Advisory, VDB Entry
References () https://vuldb.com/submit/781134 - () https://vuldb.com/submit/781134 - Third Party Advisory, VDB Entry
References () https://vuldb.com/submit/781135 - () https://vuldb.com/submit/781135 - Third Party Advisory, VDB Entry
References () https://vuldb.com/submit/781142 - () https://vuldb.com/submit/781142 - Third Party Advisory, VDB Entry
References () https://vuldb.com/submit/781143 - () https://vuldb.com/submit/781143 - Third Party Advisory, VDB Entry
References () https://vuldb.com/submit/781144 - () https://vuldb.com/submit/781144 - Third Party Advisory, VDB Entry
References () https://vuldb.com/submit/781145 - () https://vuldb.com/submit/781145 - Third Party Advisory, VDB Entry
References () https://vuldb.com/vuln/354670 - () https://vuldb.com/vuln/354670 - Third Party Advisory, VDB Entry
References () https://vuldb.com/vuln/354670/cti - () https://vuldb.com/vuln/354670/cti - Permissions Required, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
First Time Tenda
Tenda g103
Tenda g103 Firmware
CPE cpe:2.3:h:tenda:g103:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:g103_firmware:1.0.0.5:*:*:*:*:*:*:*

02 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 15:16

Updated : 2026-04-29 01:00


NVD link : CVE-2026-5339

Mitre link : CVE-2026-5339

CVE.ORG link : CVE-2026-5339


JSON object : View

Products Affected

tenda

  • g103_firmware
  • g103
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')