ID

VAR-202211-1419


CVE

CVE-2022-44167


TITLE

Tenda AC15 formSetPPTPServer function buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2022-87023

DESCRIPTION

Tenda AC15 V15.03.05.18 is avulnerable to Buffer Overflow via function formSetPPTPServer. Tenda AC15 is a wireless router made by China Tenda Company. The vulnerability is due to the fact that its formSetPPTPServer function does not check the length of the input data. Attackers can use the vulnerability to launch a denial of service attack

Trust: 1.44

sources: NVD: CVE-2022-44167 // CNVD: CNVD-2022-87023

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-87023

AFFECTED PRODUCTS

vendor:tendamodel:ac15scope:eqversion:15.03.05.18

Trust: 1.0

vendor:tendamodel:ac15scope:eqversion:v15.03.05.18

Trust: 0.6

sources: CNVD: CNVD-2022-87023 // NVD: CVE-2022-44167

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-44167
value: HIGH

Trust: 1.0

CNVD: CNVD-2022-87023
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202211-3224
value: HIGH

Trust: 0.6

CNVD: CNVD-2022-87023
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-44167
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2022-87023 // CNNVD: CNNVD-202211-3224 // NVD: CVE-2022-44167

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

sources: NVD: CVE-2022-44167

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202211-3224

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202211-3224

EXTERNAL IDS

db:NVDid:CVE-2022-44167

Trust: 2.2

db:CNVDid:CNVD-2022-87023

Trust: 0.6

db:CNNVDid:CNNVD-202211-3224

Trust: 0.6

sources: CNVD: CNVD-2022-87023 // CNNVD: CNNVD-202211-3224 // NVD: CVE-2022-44167

REFERENCES

url:https://drive.google.com/file/d/1jq8tm_2fds4wdd_afdhg1lna3vcvzdjs/view?usp=sharing

Trust: 2.2

url:https://cxsecurity.com/cveshow/cve-2022-44167/

Trust: 0.6

sources: CNVD: CNVD-2022-87023 // CNNVD: CNNVD-202211-3224 // NVD: CVE-2022-44167

SOURCES

db:CNVDid:CNVD-2022-87023
db:CNNVDid:CNNVD-202211-3224
db:NVDid:CVE-2022-44167

LAST UPDATE DATE

2024-08-14T15:06:03.865000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-87023date:2022-12-12T00:00:00
db:CNNVDid:CNNVD-202211-3224date:2022-11-22T00:00:00
db:NVDid:CVE-2022-44167date:2022-11-21T20:32:31.667

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-87023date:2022-12-08T00:00:00
db:CNNVDid:CNNVD-202211-3224date:2022-11-21T00:00:00
db:NVDid:CVE-2022-44167date:2022-11-21T15:15:10.720