ID

VAR-202209-1624


CVE

CVE-2022-40851


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  AC15  Out-of-bounds write vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2022-017559

DESCRIPTION

Tenda AC15 V15.03.05.19 contained a stack overflow via the function fromAddressNat. Shenzhen Tenda Technology Co.,Ltd. of AC15 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the fact that the fromAddressNat method does not check the size of the input data. Attackers can exploit the vulnerability to cause remote code execution or denial of service

Trust: 2.16

sources: NVD: CVE-2022-40851 // JVNDB: JVNDB-2022-017559 // CNVD: CNVD-2022-88200

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-88200

AFFECTED PRODUCTS

vendor:tendamodel:ac15scope:eqversion:15.03.05.19

Trust: 1.0

vendor:tendamodel:ac15scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac15scope: - version: -

Trust: 0.8

vendor:tendamodel:ac15scope:eqversion:ac15 firmware 15.03.05.19

Trust: 0.8

vendor:tendamodel:ac15scope:eqversion:v15.03.05.19

Trust: 0.6

sources: CNVD: CNVD-2022-88200 // JVNDB: JVNDB-2022-017559 // NVD: CVE-2022-40851

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-40851
value: CRITICAL

Trust: 1.0

NVD: CVE-2022-40851
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2022-88200
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202209-2375
value: CRITICAL

Trust: 0.6

CNVD: CNVD-2022-88200
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-40851
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-40851
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-88200 // JVNDB: JVNDB-2022-017559 // CNNVD: CNNVD-202209-2375 // NVD: CVE-2022-40851

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-017559 // NVD: CVE-2022-40851

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202209-2375

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202209-2375

PATCH

title:Patch for Tenda AC15 fromAddressNat stack overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/372591

Trust: 0.6

title:Tenda AC15 Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=208886

Trust: 0.6

sources: CNVD: CNVD-2022-88200 // CNNVD: CNNVD-202209-2375

EXTERNAL IDS

db:NVDid:CVE-2022-40851

Trust: 3.8

db:JVNDBid:JVNDB-2022-017559

Trust: 0.8

db:CNVDid:CNVD-2022-88200

Trust: 0.6

db:CNNVDid:CNNVD-202209-2375

Trust: 0.6

sources: CNVD: CNVD-2022-88200 // JVNDB: JVNDB-2022-017559 // CNNVD: CNNVD-202209-2375 // NVD: CVE-2022-40851

REFERENCES

url:https://github.com/cpseek/router-vuls/blob/main/tenda/ac15/addressnat.md

Trust: 3.0

url:https://nvd.nist.gov/vuln/detail/cve-2022-40851

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-40851/

Trust: 0.6

sources: CNVD: CNVD-2022-88200 // JVNDB: JVNDB-2022-017559 // CNNVD: CNNVD-202209-2375 // NVD: CVE-2022-40851

SOURCES

db:CNVDid:CNVD-2022-88200
db:JVNDBid:JVNDB-2022-017559
db:CNNVDid:CNNVD-202209-2375
db:NVDid:CVE-2022-40851

LAST UPDATE DATE

2024-08-14T13:53:02.076000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-88200date:2022-12-18T00:00:00
db:JVNDBid:JVNDB-2022-017559date:2023-10-13T08:42:00
db:CNNVDid:CNNVD-202209-2375date:2022-09-26T00:00:00
db:NVDid:CVE-2022-40851date:2022-09-23T20:31:13.293

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-88200date:2022-12-17T00:00:00
db:JVNDBid:JVNDB-2022-017559date:2023-10-13T00:00:00
db:CNNVDid:CNNVD-202209-2375date:2022-09-23T00:00:00
db:NVDid:CVE-2022-40851date:2022-09-23T15:15:14.360