CVE-2026-24107
Tenda · W20E V4
Tenda W20E V4 contains a command injection vulnerability due to the failure to validate the usbPartitionName parameter before it is passed to the doSystemCmd function.
Executive summary
A critical command injection flaw in Tenda W20E V4 routers allows unauthenticated attackers to execute arbitrary system-level commands via the USB partition management feature.
Vulnerability
This vulnerability stems from the direct use of the usbPartitionName parameter in a system shell command via doSystemCmd. Because the input is not sanitized, an unauthenticated attacker can inject shell metacharacters to execute arbitrary code with root privileges.
Business impact
With a CVSS score of 9.8, this vulnerability represents an absolute compromise of the device's security model. An attacker can gain a persistent foothold on the network, disable security features, and access any data stored on attached USB devices. This could lead to significant data breaches and long-term undetected presence within the environment.
Remediation
Immediate Action: Update the device firmware to the latest version to ensure that all inputs to the doSystemCmd function are properly sanitized.
Proactive Monitoring: Audit the router for any unrecognized cron jobs, scripts, or active shell sessions that could indicate a successful breach.
Compensating Controls: Disable USB-related services on the router if they are not required for business operations to eliminate the specific attack vector.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Immediate firmware replacement is the only effective way to mitigate this risk. We strongly advise administrators to treat this vulnerability as a top priority and to ensure that no Tenda routers remain exposed to the public internet with outdated software.