EUVD-2026-18342

| CVE-2026-5339 MEDIUM
2026-04-02 VulDB GHSA-7g3h-f8vq-89vv
5.1
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
X

Lifecycle Timeline

4
PoC Detected
Apr 06, 2026 - 16:07 vuln.today
Public exploit code
Analysis Generated
Apr 02, 2026 - 15:00 vuln.today
EUVD ID Assigned
Apr 02, 2026 - 15:00 euvd
EUVD-2026-18342
CVE Published
Apr 02, 2026 - 14:15 nvd
MEDIUM 5.1

Description

A vulnerability was detected in Tenda G103 1.0.0.5. The impacted element is the function action_set_net_settings of the file gpon.lua of the component Setting Handler. Performing a manipulation of the argument authLoid/authLoidPassword/authPassword/authSerialNo/authType/oltType/usVlanId/usVlanPriority results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.

Analysis

Command injection in Tenda G103 1.0.0.5 setting handler allows high-privilege remote attackers to execute arbitrary commands via manipulation of multiple GPON authentication parameters (authLoid, authLoidPassword, authPassword, authSerialNo, authType, oltType, usVlanId, usVlanPriority) in the gpon.lua component. Publicly available exploit code exists, though the CVSS:3.1/AV:N/AC:L/PR:H vector indicates attacks require high administrative privileges and deliver limited impact (confidentiality, integrity, availability each L). …

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

46
Low Medium High Critical
KEV: 0
EPSS: +0.5
CVSS: +26
POC: +20

Share

EUVD-2026-18342 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy