Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-40865: n/a in n/a

0
Critical
VulnerabilityCVE-2022-40865cvecve-2022-40865
Published: Fri Sep 23 2022 (09/23/2022, 13:35:42 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Tenda AC15 and AC18 routers V15.03.05.19 contain heap overflow vulnerabilities in the function setSchedWifi with the request /goform/openSchedWifi/

AI-Powered Analysis

AILast updated: 07/06/2025, 04:25:34 UTC

Technical Analysis

CVE-2022-40865 is a critical heap overflow vulnerability identified in Tenda AC15 and AC18 routers running firmware version V15.03.05.19. The vulnerability exists within the function setSchedWifi, which processes requests sent to the endpoint /goform/openSchedWifi/. A heap overflow occurs when more data is written to a heap buffer than it can hold, potentially allowing an attacker to overwrite adjacent memory. This can lead to arbitrary code execution, denial of service, or system compromise. The vulnerability has a CVSS 3.1 base score of 9.8, indicating it is highly severe. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the attack can be performed remotely over the network without any privileges or user interaction, and it impacts confidentiality, integrity, and availability to a high degree. The weakness is classified under CWE-787 (Out-of-bounds Write), which is a common cause of memory corruption issues. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make this vulnerability a significant risk. The lack of available patches or vendor advisories at the time of publication increases the urgency for affected users to take protective measures. Given that Tenda routers are commonly used in home and small office environments, exploitation could allow attackers to gain control over network traffic, intercept sensitive data, or disrupt internet connectivity.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Tenda AC15 and AC18 routers, this vulnerability poses a severe threat. Successful exploitation could lead to full compromise of the router, enabling attackers to intercept or manipulate network traffic, launch man-in-the-middle attacks, or pivot into internal networks. This could result in data breaches, intellectual property theft, disruption of business operations, and potential exposure of sensitive personal data protected under GDPR. The critical nature of the vulnerability means that attackers could remotely execute arbitrary code without authentication or user interaction, increasing the risk of widespread exploitation. Additionally, compromised routers could be enlisted into botnets, amplifying threats such as distributed denial-of-service (DDoS) attacks against European infrastructure. The impact is particularly concerning for organizations with limited IT security resources that may not regularly update or monitor their network devices.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, isolate affected Tenda routers from critical internal networks and restrict remote management interfaces to trusted IP addresses only. Disable any unnecessary services or remote access features on the routers. Monitor network traffic for unusual patterns that may indicate exploitation attempts. Where possible, replace vulnerable Tenda AC15 and AC18 routers with models from vendors that provide timely security updates and have a strong security track record. Implement network segmentation to limit the impact of a compromised device. Regularly audit and update router firmware as soon as vendors release patches. Employ intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts targeting the /goform/openSchedWifi/ endpoint. Finally, educate users about the risks of using outdated network equipment and encourage proactive security hygiene.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835d30c182aa0cae216c472

Added to database: 5/27/2025, 2:58:20 PM

Last enriched: 7/6/2025, 4:25:34 AM

Last updated: 2/7/2026, 6:16:06 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats