CVE-2022-41396: n/a in n/a
Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain multiple command injection vulnerabilities in the function setIPsecTunnelList via the IPsecLocalNet and IPsecRemoteNet parameters.
AI Analysis
Technical Summary
CVE-2022-41396 is a high-severity command injection vulnerability affecting the Tenda AC1200 Router Model W15Ev2 running firmware version V15.11.0.10(1576). The vulnerability resides in the function setIPsecTunnelList, specifically within the parameters IPsecLocalNet and IPsecRemoteNet. These parameters are used to configure IPsec tunnels on the router. Due to insufficient input validation or sanitization, an attacker with limited privileges (local access with low privileges) can inject arbitrary commands through these parameters. The vulnerability allows execution of arbitrary system commands with the privileges of the affected process, potentially leading to full compromise of the device. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The attack vector is local (AV:L), meaning the attacker must have local network access or authenticated access to the device's management interface. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). No public exploits are currently known in the wild, and no patches have been linked or published yet. This vulnerability could be exploited by an attacker who gains access to the router's management interface or local network, enabling them to execute arbitrary commands, potentially leading to network compromise, interception of traffic, or disruption of services.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those using Tenda AC1200 W15Ev2 routers in their network infrastructure. Successful exploitation could lead to unauthorized control over the router, allowing attackers to intercept, modify, or redirect network traffic, which compromises confidentiality and integrity of communications. Additionally, attackers could disrupt network availability by altering configurations or causing device failures. This is particularly critical for small and medium enterprises or branch offices that rely on consumer-grade routers like the Tenda AC1200 for VPN or IPsec tunnel connectivity. The local attack vector means that attackers would need to be inside the network or have credentials to access the router interface, which could be achieved through phishing, credential reuse, or insider threats. Given the high impact on confidentiality, integrity, and availability, exploitation could lead to data breaches, espionage, or denial of service conditions affecting business operations and compliance with data protection regulations such as GDPR.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the router's management interface to trusted networks and users only, preferably via VPN or secure management VLANs. 2. Change default or weak credentials to strong, unique passwords to prevent unauthorized access. 3. Disable remote management features if not required to reduce exposure. 4. Monitor network traffic for unusual activity that could indicate exploitation attempts. 5. Segment the network to limit lateral movement in case of compromise. 6. Regularly audit and update router firmware; although no patch is currently linked, monitor Tenda's official channels for security updates addressing this vulnerability. 7. Consider replacing vulnerable devices with enterprise-grade routers that have better security controls and timely patching. 8. Implement network intrusion detection systems (NIDS) to detect command injection attempts or abnormal command executions on network devices. 9. Educate staff on the risks of credential compromise and enforce multi-factor authentication where possible for device management.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2022-41396: n/a in n/a
Description
Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain multiple command injection vulnerabilities in the function setIPsecTunnelList via the IPsecLocalNet and IPsecRemoteNet parameters.
AI-Powered Analysis
Technical Analysis
CVE-2022-41396 is a high-severity command injection vulnerability affecting the Tenda AC1200 Router Model W15Ev2 running firmware version V15.11.0.10(1576). The vulnerability resides in the function setIPsecTunnelList, specifically within the parameters IPsecLocalNet and IPsecRemoteNet. These parameters are used to configure IPsec tunnels on the router. Due to insufficient input validation or sanitization, an attacker with limited privileges (local access with low privileges) can inject arbitrary commands through these parameters. The vulnerability allows execution of arbitrary system commands with the privileges of the affected process, potentially leading to full compromise of the device. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The attack vector is local (AV:L), meaning the attacker must have local network access or authenticated access to the device's management interface. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). No public exploits are currently known in the wild, and no patches have been linked or published yet. This vulnerability could be exploited by an attacker who gains access to the router's management interface or local network, enabling them to execute arbitrary commands, potentially leading to network compromise, interception of traffic, or disruption of services.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those using Tenda AC1200 W15Ev2 routers in their network infrastructure. Successful exploitation could lead to unauthorized control over the router, allowing attackers to intercept, modify, or redirect network traffic, which compromises confidentiality and integrity of communications. Additionally, attackers could disrupt network availability by altering configurations or causing device failures. This is particularly critical for small and medium enterprises or branch offices that rely on consumer-grade routers like the Tenda AC1200 for VPN or IPsec tunnel connectivity. The local attack vector means that attackers would need to be inside the network or have credentials to access the router interface, which could be achieved through phishing, credential reuse, or insider threats. Given the high impact on confidentiality, integrity, and availability, exploitation could lead to data breaches, espionage, or denial of service conditions affecting business operations and compliance with data protection regulations such as GDPR.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the router's management interface to trusted networks and users only, preferably via VPN or secure management VLANs. 2. Change default or weak credentials to strong, unique passwords to prevent unauthorized access. 3. Disable remote management features if not required to reduce exposure. 4. Monitor network traffic for unusual activity that could indicate exploitation attempts. 5. Segment the network to limit lateral movement in case of compromise. 6. Regularly audit and update router firmware; although no patch is currently linked, monitor Tenda's official channels for security updates addressing this vulnerability. 7. Consider replacing vulnerable devices with enterprise-grade routers that have better security controls and timely patching. 8. Implement network intrusion detection systems (NIDS) to detect command injection attempts or abnormal command executions on network devices. 9. Educate staff on the risks of credential compromise and enforce multi-factor authentication where possible for device management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-09-26T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbee090
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 7/2/2025, 4:39:55 AM
Last updated: 7/26/2025, 9:45:55 PM
Views: 7
Related Threats
CVE-2025-43734: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-36124: CWE-268 Privilege Chaining in IBM WebSphere Application Server Liberty
MediumCVE-2025-55168: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-53744: Escalation of privilege in Fortinet FortiOS
MediumCVE-2025-52970: Improper access control in Fortinet FortiWeb
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.