<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>HG3 2.0 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/hg3-2.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 27 Apr 2026 22:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/hg3-2.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tenda HG3 2.0 Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-command-injection/</link><pubDate>Mon, 27 Apr 2026 22:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-command-injection/</guid><description>Tenda HG3 2.0 is vulnerable to command injection; by manipulating the datasize argument in the formTracert function of the /boaform/formTracert file, a remote attacker can inject commands.</description><content:encoded><![CDATA[<p>Tenda HG3 2.0 is vulnerable to a command injection vulnerability (CVE-2026-7160) affecting the formTracert function in the /boaform/formTracert file. A remote attacker can exploit this by manipulating the datasize argument to inject arbitrary commands into the system. The vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity. Public disclosure and potential exploitation make this a critical issue for users of the Tenda HG3 2.0 router. Successful exploitation allows an attacker to execute arbitrary commands on the device, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG3 2.0 router with an exposed web interface.</li>
<li>The attacker crafts a malicious HTTP request targeting the /boaform/formTracert endpoint.</li>
<li>The malicious request includes a manipulated datasize argument designed to inject a command.</li>
<li>The web server processes the request and passes the manipulated datasize argument to the formTracert function.</li>
<li>The formTracert function fails to properly sanitize the input, allowing the injected command to be executed by the system.</li>
<li>The injected command executes with the privileges of the web server process.</li>
<li>The attacker gains arbitrary code execution on the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary commands on the Tenda HG3 2.0 router. This can lead to complete compromise of the device, including modification of router settings, interception of network traffic, and potential use of the router as a botnet node. Given the high base score of 8.8, this poses a significant risk to affected users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Tenda to address CVE-2026-7160.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/boaform/formTracert</code> with unusual <code>datasize</code> parameters, as covered by the Sigma rule &ldquo;Detect Tenda HG3 Command Injection Attempt&rdquo;.</li>
<li>Implement network intrusion detection system (IDS) rules to detect and block exploit attempts targeting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>cve-2026-7160</category><category>tenda</category></item></channel></rss>