Skip to main content

CVE-2022-40865: n/a in n/a

Critical
VulnerabilityCVE-2022-40865cvecve-2022-40865
Published: Fri Sep 23 2022 (09/23/2022, 13:35:42 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Tenda AC15 and AC18 routers V15.03.05.19 contain heap overflow vulnerabilities in the function setSchedWifi with the request /goform/openSchedWifi/

AI-Powered Analysis

AILast updated: 07/06/2025, 04:25:34 UTC

Technical Analysis

CVE-2022-40865 is a critical heap overflow vulnerability identified in Tenda AC15 and AC18 routers running firmware version V15.03.05.19. The vulnerability exists within the function setSchedWifi, which processes requests sent to the endpoint /goform/openSchedWifi/. A heap overflow occurs when more data is written to a heap buffer than it can hold, potentially allowing an attacker to overwrite adjacent memory. This can lead to arbitrary code execution, denial of service, or system compromise. The vulnerability has a CVSS 3.1 base score of 9.8, indicating it is highly severe. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the attack can be performed remotely over the network without any privileges or user interaction, and it impacts confidentiality, integrity, and availability to a high degree. The weakness is classified under CWE-787 (Out-of-bounds Write), which is a common cause of memory corruption issues. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make this vulnerability a significant risk. The lack of available patches or vendor advisories at the time of publication increases the urgency for affected users to take protective measures. Given that Tenda routers are commonly used in home and small office environments, exploitation could allow attackers to gain control over network traffic, intercept sensitive data, or disrupt internet connectivity.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Tenda AC15 and AC18 routers, this vulnerability poses a severe threat. Successful exploitation could lead to full compromise of the router, enabling attackers to intercept or manipulate network traffic, launch man-in-the-middle attacks, or pivot into internal networks. This could result in data breaches, intellectual property theft, disruption of business operations, and potential exposure of sensitive personal data protected under GDPR. The critical nature of the vulnerability means that attackers could remotely execute arbitrary code without authentication or user interaction, increasing the risk of widespread exploitation. Additionally, compromised routers could be enlisted into botnets, amplifying threats such as distributed denial-of-service (DDoS) attacks against European infrastructure. The impact is particularly concerning for organizations with limited IT security resources that may not regularly update or monitor their network devices.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, isolate affected Tenda routers from critical internal networks and restrict remote management interfaces to trusted IP addresses only. Disable any unnecessary services or remote access features on the routers. Monitor network traffic for unusual patterns that may indicate exploitation attempts. Where possible, replace vulnerable Tenda AC15 and AC18 routers with models from vendors that provide timely security updates and have a strong security track record. Implement network segmentation to limit the impact of a compromised device. Regularly audit and update router firmware as soon as vendors release patches. Employ intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts targeting the /goform/openSchedWifi/ endpoint. Finally, educate users about the risks of using outdated network equipment and encourage proactive security hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835d30c182aa0cae216c472

Added to database: 5/27/2025, 2:58:20 PM

Last enriched: 7/6/2025, 4:25:34 AM

Last updated: 8/14/2025, 7:25:51 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats