ID

VAR-202209-1672


CVE

CVE-2022-40860


TITLE

Tenda  of  AC15  Out-of-bounds write vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2022-017557

DESCRIPTION

Tenda AC15 router V15.03.05.19 contains a stack overflow vulnerability in the function formSetQosBand->FUN_0007dd20 with request /goform/SetNetControlList. Tenda of AC15 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC15 is a wireless router made by China Tenda Company. The vulnerability is due to the fact that the formSetQosBand method does not check the size of the input data when it has the request /goform/SetNetControlList. Attackers can exploit the vulnerability to cause remote code execution or denial of service

Trust: 2.16

sources: NVD: CVE-2022-40860 // JVNDB: JVNDB-2022-017557 // CNVD: CNVD-2022-88199

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-88199

AFFECTED PRODUCTS

vendor:tendacnmodel:ac15scope:eqversion:15.03.05.19

Trust: 1.0

vendor:tendamodel:ac15scope:eqversion:ac15 firmware 15.03.05.19

Trust: 0.8

vendor:tendamodel:ac15scope: - version: -

Trust: 0.8

vendor:tendamodel:ac15scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac15scope:eqversion:v15.03.05.19

Trust: 0.6

sources: CNVD: CNVD-2022-88199 // JVNDB: JVNDB-2022-017557 // NVD: CVE-2022-40860

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-40860
value: CRITICAL

Trust: 1.0

NVD: CVE-2022-40860
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2022-88199
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202209-2394
value: CRITICAL

Trust: 0.6

CNVD: CNVD-2022-88199
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-40860
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-40860
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-88199 // JVNDB: JVNDB-2022-017557 // CNNVD: CNNVD-202209-2394 // NVD: CVE-2022-40860

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-017557 // NVD: CVE-2022-40860

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202209-2394

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202209-2394

PATCH

title:Patch for Tenda AC15 formSetQosBand stack overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/372586

Trust: 0.6

title:Tenda AC15 Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=208896

Trust: 0.6

sources: CNVD: CNVD-2022-88199 // CNNVD: CNNVD-202209-2394

EXTERNAL IDS

db:NVDid:CVE-2022-40860

Trust: 3.8

db:JVNDBid:JVNDB-2022-017557

Trust: 0.8

db:CNVDid:CNVD-2022-88199

Trust: 0.6

db:CNNVDid:CNNVD-202209-2394

Trust: 0.6

sources: CNVD: CNVD-2022-88199 // JVNDB: JVNDB-2022-017557 // CNNVD: CNNVD-202209-2394 // NVD: CVE-2022-40860

REFERENCES

url:https://github.com/cpseek/router-vuls/blob/main/tenda/ac15/formsetqosband.md

Trust: 3.0

url:https://nvd.nist.gov/vuln/detail/cve-2022-40860

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-40860/

Trust: 0.6

sources: CNVD: CNVD-2022-88199 // JVNDB: JVNDB-2022-017557 // CNNVD: CNNVD-202209-2394 // NVD: CVE-2022-40860

SOURCES

db:CNVDid:CNVD-2022-88199
db:JVNDBid:JVNDB-2022-017557
db:CNNVDid:CNNVD-202209-2394
db:NVDid:CVE-2022-40860

LAST UPDATE DATE

2024-08-14T14:02:21.404000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-88199date:2022-12-18T00:00:00
db:JVNDBid:JVNDB-2022-017557date:2023-10-13T08:42:00
db:CNNVDid:CNNVD-202209-2394date:2022-09-26T00:00:00
db:NVDid:CVE-2022-40860date:2022-09-23T20:28:32.340

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-88199date:2022-12-17T00:00:00
db:JVNDBid:JVNDB-2022-017557date:2023-10-13T00:00:00
db:CNNVDid:CNNVD-202209-2394date:2022-09-23T00:00:00
db:NVDid:CVE-2022-40860date:2022-09-23T14:15:13.217