Skip to main content

CVE-2022-40861: n/a in n/a

High
VulnerabilityCVE-2022-40861cvecve-2022-40861
Published: Fri Sep 23 2022 (09/23/2022, 14:37:09 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC18 router V15.03.05.19 contains a stack overflow vulnerability in the formSetQosBand->FUN_0007db78 function with the request /goform/SetNetControlList/

AI-Powered Analysis

AILast updated: 07/08/2025, 05:27:46 UTC

Technical Analysis

CVE-2022-40861 is a high-severity stack overflow vulnerability identified in the Tenda AC18 router firmware version V15.03.05.19. The flaw exists within the function formSetQosBand->FUN_0007db78, which processes requests sent to the /goform/SetNetControlList/ endpoint. A stack overflow occurs when the function improperly handles input data, allowing an attacker to overwrite parts of the stack memory. This can lead to arbitrary code execution, denial of service, or other malicious outcomes. The vulnerability has a CVSS v3.1 base score of 7.2, indicating a high impact with network attack vector (AV:N), low attack complexity (AC:L), but requiring high privileges (PR:H) and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No public exploits are currently known in the wild, and no official patches have been linked yet. The vulnerability is categorized under CWE-787 (Out-of-bounds Write), a common and dangerous class of memory corruption bugs. Given the nature of the vulnerability, an attacker with high privileges on the device's network interface could exploit this flaw remotely to gain control over the router or disrupt its operation.

Potential Impact

For European organizations, especially those relying on Tenda AC18 routers for network connectivity, this vulnerability poses a significant risk. Exploitation could lead to full compromise of the router, enabling attackers to intercept, manipulate, or disrupt network traffic. This could result in data breaches, loss of network availability, or serve as a foothold for lateral movement within corporate networks. The high impact on confidentiality, integrity, and availability means sensitive organizational data and critical services could be jeopardized. Small and medium enterprises or branch offices using this router model without robust network segmentation or monitoring are particularly vulnerable. Additionally, compromised routers could be leveraged in botnets or for launching further attacks, amplifying the threat landscape in Europe. The lack of a patch increases the urgency for organizations to implement interim mitigations to reduce exposure.

Mitigation Recommendations

Given the absence of an official patch, European organizations should take immediate steps to mitigate risk. First, restrict access to the router management interface, especially the /goform/SetNetControlList/ endpoint, by limiting it to trusted internal networks and disabling remote management if enabled. Implement strict network segmentation to isolate routers from critical infrastructure and sensitive data environments. Monitor network traffic for unusual activity or signs of exploitation attempts targeting the router. Where possible, upgrade or replace affected Tenda AC18 routers with models that have received security updates or are known to be secure. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. Finally, maintain an inventory of affected devices and stay alert for vendor advisories or patches to apply updates promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-19T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f84020acd01a249264e4f

Added to database: 5/22/2025, 8:07:30 PM

Last enriched: 7/8/2025, 5:27:46 AM

Last updated: 7/30/2025, 2:16:19 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats