ID

VAR-202203-0593


CVE

CVE-2022-25449


TITLE

Tenda AC6 Buffer Overflow Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2022-26249

DESCRIPTION

Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the deviceId parameter in the saveParentControlInfo function. The Tenda AC6 is a wireless router from the Chinese company Tenda. A buffer overflow vulnerability exists in Tenda AC6. The vulnerability arises from the fact that the deviceId parameter in the saveParentControlInfo function does not properly verify the data boundary when performing operations on memory. An attacker can exploit this vulnerability to execute arbitrary commands

Trust: 1.44

sources: NVD: CVE-2022-25449 // CNVD: CNVD-2022-26249

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-26249

AFFECTED PRODUCTS

vendor:tendamodel:ac6scope:eqversion:15.03.05.09

Trust: 1.0

vendor:tendamodel:ac6 v15.03.05.09 multiscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2022-26249 // NVD: CVE-2022-25449

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-25449
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2022-26249
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202203-1842
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2022-25449
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2022-26249
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-25449
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2022-26249 // CNNVD: CNNVD-202203-1842 // NVD: CVE-2022-25449

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

sources: NVD: CVE-2022-25449

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202203-1842

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202203-1842

PATCH

title:Patch for Tenda AC6 Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/328741

Trust: 0.6

title:Tenda AC6 Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=186923

Trust: 0.6

sources: CNVD: CNVD-2022-26249 // CNNVD: CNNVD-202203-1842

EXTERNAL IDS

db:NVDid:CVE-2022-25449

Trust: 2.2

db:CNVDid:CNVD-2022-26249

Trust: 0.6

db:CNNVDid:CNNVD-202203-1842

Trust: 0.6

sources: CNVD: CNVD-2022-26249 // CNNVD: CNNVD-202203-1842 // NVD: CVE-2022-25449

REFERENCES

url:https://github.com/ephaha/iot_vuln/tree/main/tenda/ac6/5

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-25449

Trust: 1.2

url:https://cxsecurity.com/cveshow/cve-2022-25449/

Trust: 0.6

sources: CNVD: CNVD-2022-26249 // CNNVD: CNNVD-202203-1842 // NVD: CVE-2022-25449

SOURCES

db:CNVDid:CNVD-2022-26249
db:CNNVDid:CNNVD-202203-1842
db:NVDid:CVE-2022-25449

LAST UPDATE DATE

2024-11-23T22:57:47.190000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-26249date:2022-04-06T00:00:00
db:CNNVDid:CNNVD-202203-1842date:2022-03-28T00:00:00
db:NVDid:CVE-2022-25449date:2024-11-21T06:52:12.130

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-26249date:2022-04-06T00:00:00
db:CNNVDid:CNNVD-202203-1842date:2022-03-18T00:00:00
db:NVDid:CVE-2022-25449date:2022-03-18T21:15:08.510