Categories: Cyber Security News

Tenda N300 Vulnerabilities Let Attacker to Execute Arbitrary Commands as Root User

Tenda N300 wireless routers and 4G03 Pro portable LTE devices face severe security threats from multiple command injection vulnerabilities that allow attackers to execute arbitrary commands with root privileges.

The affected devices currently lack vendor patches, leaving users vulnerable. The vulnerabilities stem from improper handling of user input within critical service functions on these Tenda devices.

Command Injection Flaws in Tenda N300

According to CERT/CC , Attackers can exploit these flaws through specially crafted HTTP requests to gain complete control over affected routers.

CVE-2025-13207 affects Tenda 4G03 Pro firmware versions up to and including v04.03.01.44.

An authenticated attacker can manipulate arguments passed to functions within the /usr/sbin/httpd service.

CVE ID Affected Products Vulnerability Type Attack Vector Impact
CVE-2025-13207 Tenda 4G03 Pro (firmware ≤v04.03.01.44) Command Injection Network (HTTP TCP port 80) Remote Code Execution as root
CVE-2024-24481 Tenda N300 / 4G03 Pro (firmware ≤v04.03.01.14) Command Injection Network (TCP port 7329) Remote Code Execution as root

By sending a crafted HTTP request to TCP port 80, the attacker can execute arbitrary commands as the root user.

CVE-2024-24481 impacts firmware versions up to v04.03.01.14 and involves improper input handling within an accessible web interface function.

An authenticated attacker can invoke this function and send a crafted network request to TCP port 7329, resulting in command execution.

Carnegie Mellon University researchers note that this issue is distinct from CVE-2023-2649. Successful exploitation grants attackers total control of the affected device.

Once compromised, attackers can modify router configurations, intercept network traffic, deploy malware, or use the device as a central point for further network attacks.

Sponsored

Given that these are network infrastructure devices, the compromise could affect all connected devices and data passing through the router.

Since Tenda has not released patches to address these vulnerabilities, the CERT/CC recommends several mitigation steps.

Users in security-sensitive environments should consider replacing affected devices with alternative routers from other vendors.

If immediate replacement is not possible, minimize the device’s exposure by limiting network access and restricting usage where feasible.

Users should regularly monitor Tenda’s official website and security advisories for potential firmware updates or patches.

The vulnerabilities were publicly disclosed on November 20, 2025, and vendor remediation remains unavailable at this time.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Tenda N300 Vulnerabilities Let Attacker to Execute Arbitrary Commands as Root User appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Brownwood community gathers for ‘Wheels That Move the World’

BROWNWOOD, Texas (KTAB/KRBC) - Families in Brownwood spent part of their spring break getting an…

1 hour ago

MY TAKE: The AI magic is back — whether it endures depends on Amazon’s next moves

I ran an experiment this week that I did not expect to be instructive, and…

2 hours ago

Pluralistic: Corrupt anticorruption (14 Mar 2026)

Today's links Corrupt anticorruption: Notes from a target-rich environment. Hey look at this: Delights to…

3 hours ago

This Week’s Awesome Tech Stories From Around the Web (Through March 14)

Robotics How Pokémon Go Is Giving Delivery Robots an Inch-Perfect View of the WorldWill Douglas…

3 hours ago

How to Design and Apply AI Avatars for Modern Learning and Communication

Digital communication is well beyond picture and prose. Nowadays viewers demand more interactive and human-like…

3 hours ago

How AI Video Generators Are Revolutionizing the Film Industry (2026)

AI video generators are revolutionizing the film industry in 2026 by drastically reducing VFX budgets,…

3 hours ago

This website uses cookies.