Tenda G300-F router firmware version 16.01.14.2 and prior contain an OS command injection vulnerability in the WAN diagnostic functionality (formSetWanDiag). The implementation constructs a shell command that invokes curl and incorporates attacker-controlled input into the command line without adequate neutralization. As a result, a remote attacker with access to the affected management interface can inject additional shell syntax and execute arbitrary commands on the device with the privileges of the management process.
References
| Link | Resource |
|---|---|
| https://blog.evan.lat/blog/cve-2026-25857/ | Exploit Third Party Advisory |
| https://www.tendacn.com/material/show/736333682028613 | Product |
| https://www.vulncheck.com/advisories/tenda-g300-f-command-injection-via-formsetwandiag | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-07 22:16
Updated : 2026-03-05 20:33
NVD link : CVE-2026-25857
Mitre link : CVE-2026-25857
CVE.ORG link : CVE-2026-25857
JSON object : View
Products Affected
tenda
- g300-f_firmware
- g300-f
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
