ID

VAR-202211-1423


CVE

CVE-2022-44156


TITLE

Tenda AC15 formSetIpMacBind function buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2022-87022

DESCRIPTION

Tenda AC15 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetIpMacBind. Tenda AC15 is a wireless router made by China Tenda Company. The vulnerability comes from the fact that its formSetIpMacBind function does not check the length of the input data. Attackers can use the vulnerability to launch a denial of service attack

Trust: 1.44

sources: NVD: CVE-2022-44156 // CNVD: CNVD-2022-87022

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-87022

AFFECTED PRODUCTS

vendor:tendamodel:ac15scope:eqversion:15.03.05.19

Trust: 1.0

vendor:tendamodel:ac15scope:eqversion:v15.03.05.19

Trust: 0.6

sources: CNVD: CNVD-2022-87022 // NVD: CVE-2022-44156

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-44156
value: HIGH

Trust: 1.0

CNVD: CNVD-2022-87022
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202211-3203
value: HIGH

Trust: 0.6

CNVD: CNVD-2022-87022
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-44156
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2022-87022 // CNNVD: CNNVD-202211-3203 // NVD: CVE-2022-44156

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

sources: NVD: CVE-2022-44156

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202211-3203

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202211-3203

EXTERNAL IDS

db:NVDid:CVE-2022-44156

Trust: 2.2

db:CNVDid:CNVD-2022-87022

Trust: 0.6

db:CNNVDid:CNNVD-202211-3203

Trust: 0.6

sources: CNVD: CNVD-2022-87022 // CNNVD: CNNVD-202211-3203 // NVD: CVE-2022-44156

REFERENCES

url:https://drive.google.com/file/d/1dbmwbyl40uqmisv_doew8pfjrhgx-j97/view?usp=sharing

Trust: 2.2

url:https://cxsecurity.com/cveshow/cve-2022-44156/

Trust: 0.6

sources: CNVD: CNVD-2022-87022 // CNNVD: CNNVD-202211-3203 // NVD: CVE-2022-44156

SOURCES

db:CNVDid:CNVD-2022-87022
db:CNNVDid:CNNVD-202211-3203
db:NVDid:CVE-2022-44156

LAST UPDATE DATE

2024-08-14T15:37:18.645000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-87022date:2022-12-12T00:00:00
db:CNNVDid:CNNVD-202211-3203date:2022-11-23T00:00:00
db:NVDid:CVE-2022-44156date:2022-11-22T01:07:45.960

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-87022date:2022-12-08T00:00:00
db:CNNVDid:CNNVD-202211-3203date:2022-11-21T00:00:00
db:NVDid:CVE-2022-44156date:2022-11-21T16:15:25.803