No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda g103
|
|
| Vendors & Products |
Tenda g103
|
|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in Tenda G103 1.0.0.5. The impacted element is the function action_set_net_settings of the file gpon.lua of the component Setting Handler. Performing a manipulation of the argument authLoid/authLoidPassword/authPassword/authSerialNo/authType/oltType/usVlanId/usVlanPriority results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. | |
| Title | Tenda G103 Setting gpon.lua action_set_net_settings command injection | |
| First Time appeared |
Tenda
Tenda g103 Firmware |
|
| Weaknesses | CWE-74 CWE-77 |
|
| CPEs | cpe:2.3:o:tenda:g103_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenda
Tenda g103 Firmware |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-02T15:55:52.097Z
Reserved: 2026-04-01T14:09:12.110Z
Link: CVE-2026-5339
Updated: 2026-04-02T15:55:45.695Z
Status : Received
Published: 2026-04-02T15:16:53.080
Modified: 2026-04-02T15:16:53.080
Link: CVE-2026-5339
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:21:01Z