Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-40847: n/a in n/a

0
High
VulnerabilityCVE-2022-40847cvecve-2022-40847
Published: Tue Nov 15 2022 (11/15/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

In Tenda AC1200 Router model W15Ev2 V15.11.0.10(1576), there exists a command injection vulnerability in the function formSetFixTools. This vulnerability allows attackers to run arbitrary commands on the server via the hostname parameter.

AI-Powered Analysis

AILast updated: 07/02/2025, 04:30:05 UTC

Technical Analysis

CVE-2022-40847 is a command injection vulnerability identified in the Tenda AC1200 Router model W15Ev2 running firmware version V15.11.0.10(1576). The vulnerability exists in the function formSetFixTools, which improperly handles the hostname parameter. An attacker with low privileges and local access can exploit this flaw by injecting arbitrary commands through the hostname parameter, which the router executes on the underlying system. This leads to full compromise of the device, allowing an attacker to execute arbitrary code with high privileges. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that user input is not properly sanitized before being passed to system commands. The CVSS v3.1 base score is 7.8 (high severity), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access but low complexity and privileges, no user interaction, and results in high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported, and no patches or vendor advisories are currently linked. The vulnerability allows attackers to take full control of the router, potentially leading to network compromise, interception of traffic, or pivoting to other internal systems.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using Tenda AC1200 W15Ev2 routers in their network infrastructure. Exploitation can lead to complete device takeover, enabling attackers to intercept, modify, or redirect network traffic, potentially compromising sensitive data and internal communications. The router compromise can also serve as a foothold for lateral movement within corporate networks, increasing the risk of broader network breaches. Given the high impact on confidentiality, integrity, and availability, critical business operations relying on these routers could be disrupted. Additionally, compromised routers can be used as part of botnets or for launching further attacks, affecting organizational reputation and compliance with data protection regulations such as GDPR. The requirement for local or adjacent network access limits remote exploitation but does not eliminate risk, as attackers may gain local access through phishing, insider threats, or compromised devices within the network.

Mitigation Recommendations

Organizations should first inventory their network devices to identify the presence of Tenda AC1200 W15Ev2 routers running the vulnerable firmware version. Since no official patches are currently linked, immediate mitigation includes restricting physical and network access to these devices, especially limiting access to trusted administrators only. Network segmentation should be enforced to isolate vulnerable routers from critical systems and sensitive data. Implement strict access controls and monitoring on management interfaces to detect and prevent unauthorized access attempts. Consider replacing vulnerable routers with models from vendors providing timely security updates. Additionally, monitor network traffic for unusual patterns that may indicate exploitation attempts. If feasible, disable or restrict the functionality related to the formSetFixTools function or the hostname parameter through configuration changes or firewall rules. Regularly review vendor communications for updates or patches addressing this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-19T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee07d

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 7/2/2025, 4:30:05 AM

Last updated: 2/7/2026, 6:31:12 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats