Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-30326 | Tenda AC6 router firmware 15.03.05.19 contains a command injection vulnerability in the formSetIptv function, which processes requests to the /goform/SetIPTVCfg web interface. When handling the list and vlanId parameters, the sub_ADBC0 helper function concatenates these user-supplied values into nvram set system commands using doSystemCmd, without validating or sanitizing special characters (e.g., ;, ", #). An unauthenticated or authenticated attacker can exploit this by submitting a crafted POST request, leading to arbitrary system command execution on the affected device. |
Thu, 25 Sep 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac6 Firmware
|
|
| CPEs | cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac6_firmware:15.03.05.19:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ac6 Firmware
|
Mon, 22 Sep 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac6 |
|
| Vendors & Products |
Tenda
Tenda ac6 |
Fri, 19 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Fri, 19 Sep 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tenda AC6 router firmware 15.03.05.19 contains a command injection vulnerability in the formSetIptv function, which processes requests to the /goform/SetIPTVCfg web interface. When handling the list and vlanId parameters, the sub_ADBC0 helper function concatenates these user-supplied values into nvram set system commands using doSystemCmd, without validating or sanitizing special characters (e.g., ;, ", #). An unauthenticated or authenticated attacker can exploit this by submitting a crafted POST request, leading to arbitrary system command execution on the affected device. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-19T17:58:17.915Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57296
Updated: 2025-09-19T17:58:11.379Z
Status : Analyzed
Published: 2025-09-19T16:15:46.107
Modified: 2025-09-25T19:34:34.617
Link: CVE-2025-57296
No data.
OpenCVE Enrichment
Updated: 2025-09-22T10:06:20Z
EUVD