{"vuid":"VU#268029","idnumber":"268029","name":"Tenda N300 Wi-Fi 4G LTE Router 4G03 Pro impacted by vulnerabilities","keywords":null,"overview":"### Overview\r\n\r\nA command injection vulnerability exists across multiple firmware versions that allows an attacker to execute arbitrary commands as `root` on the affected device. Currently, no solution exists to resolve these vulnerabilities in the Tenda N300 series and Tenda 4G03 Pro devices.\r\n\r\n### Description\r\n\r\nTenda 4G03 Pro is a portable 4G LTE router that is designed  to provide for flexible internet access. It is a plug-and-play device compatible with mobile operators globally, allowing you to insert a SIM card for ad-hoc internet access. Multiple components within this model of Tenda 4G LTE router is impacted by command injection flaws that stem from improper handling of attacker-controlled input passed to internal service functions.\r\n\r\n**CVE-2025-13207**\r\nIn Firmware up to and including v04.03.01.44, manipulation of arguments passed to a function within the service /usr/sbin/httpd can be exploited. A crafted, authenticated HTTP request to TCP port 80 can trigger arbitrary command execution.\r\n\r\n**CVE-2024-24481**\r\nIn Firmware up to and including v04.03.01.14, improper input handling within an accessible function leads to a similar command injection condition. An authenticated attacker can invoke the function through the web interface, after which a crafted network request to TCP port 7329 can result in command execution. This issue is distinct from CVE-2023-2649.\r\n\r\nThese vulnerabilities were identified through reverse engineering of the firmware. At this time, no fixed firmware is available to address these vulnerabilities.\r\n\r\n### Impact\r\n\r\nSuccessful exploitation allows an attacker to execute arbitrary commands as root on the underlying operating system, allowing attacker to take Total control of the device.\r\n\r\n### Solution\r\n\r\nThe CERT/CC is currently unaware of a vendor-supplied patch or mitigation for these vulnerabilities.\r\n\r\n\r\n* **Use an alternative device:** Because no remediation is currently available, users who rely on this device in security-sensitive may consider other devices for such access.\r\n* **Reduce exposure where possible:** If replacement is not immediately feasible, limit usage to reduce risk of abuse.\r\n* **Monitor for vendor updates:** Users should periodically check for firmware updates or advisories from Tenda in case a patch becomes available in the future.\r\n\r\n### Acknowledgements\r\n\r\nThanks to the reporter Ax for reporting this issue. This document was written by Marisa Middler and Timur Snoke.","clean_desc":null,"impact":null,"resolution":null,"workarounds":null,"sysaffected":null,"thanks":null,"author":null,"public":["https://www.tendacn.com/us/product/4G03Pro"],"cveids":["CVE-2024-24481","CVE-2025-13207"],"certadvisory":null,"uscerttechnicalalert":null,"datecreated":"2025-11-20T17:02:10.744183Z","publicdate":"2025-11-20T17:02:10.554803Z","datefirstpublished":"2025-11-20T17:02:10.766199Z","dateupdated":"2025-11-20T17:02:10.554798Z","revision":1,"vrda_d1_directreport":null,"vrda_d1_population":null,"vrda_d1_impact":null,"cam_widelyknown":null,"cam_exploitation":null,"cam_internetinfrastructure":null,"cam_population":null,"cam_impact":null,"cam_easeofexploitation":null,"cam_attackeraccessrequired":null,"cam_scorecurrent":null,"cam_scorecurrentwidelyknown":null,"cam_scorecurrentwidelyknownexploited":null,"ipprotocol":null,"cvss_accessvector":null,"cvss_accesscomplexity":null,"cvss_authentication":null,"cvss_confidentialityimpact":null,"cvss_integrityimpact":null,"cvss_availabilityimpact":null,"cvss_exploitablity":null,"cvss_remediationlevel":null,"cvss_reportconfidence":null,"cvss_collateraldamagepotential":null,"cvss_targetdistribution":null,"cvss_securityrequirementscr":null,"cvss_securityrequirementsir":null,"cvss_securityrequirementsar":null,"cvss_basescore":null,"cvss_basevector":null,"cvss_temporalscore":null,"cvss_environmentalscore":null,"cvss_environmentalvector":null,"metric":null,"vulnote":151}