Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-42079: n/a in n/a

0
High
VulnerabilityCVE-2022-42079cvecve-2022-42079
Published: Wed Oct 12 2022 (10/12/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a stack overflow via the function formWifiBasicSet.

AI-Powered Analysis

AILast updated: 07/06/2025, 08:54:59 UTC

Technical Analysis

CVE-2022-42079 is a high-severity stack overflow vulnerability identified in the Tenda AC1206 router firmware version US_AC1206V1.0RTL_V15.03.06.23_multi_TD01. The vulnerability arises from improper handling of input data in the function formWifiBasicSet, which is likely responsible for configuring basic Wi-Fi settings. A stack overflow occurs when the function processes input that exceeds the allocated buffer size, leading to memory corruption. This type of vulnerability can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on availability (A:H), meaning an attacker can cause a denial of service by crashing the device or potentially execute arbitrary code if further exploitation is possible, although no confidentiality or integrity impacts are noted. The vulnerability is classified under CWE-787 (Out-of-bounds Write), which is a common and critical class of memory corruption bugs. No patches or known exploits have been reported at the time of publication, but the ease of exploitation and network accessibility of routers make this a significant threat. The lack of vendor and product details beyond the model and firmware version limits the scope of detailed technical mitigation but does not diminish the criticality of the vulnerability in affected devices.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for small and medium enterprises (SMEs) and home office setups relying on Tenda AC1206 routers for internet connectivity. A successful exploit could lead to denial of service, disrupting network availability and potentially causing operational downtime. In environments where these routers are used as part of critical infrastructure or in remote branch offices, the loss of connectivity could affect business continuity and productivity. Although the vulnerability does not directly compromise confidentiality or integrity, the resulting service disruption could indirectly impact security monitoring, remote access, and other dependent services. Additionally, if attackers develop advanced exploits, there is a risk of further compromise. The absence of patches increases the urgency for organizations to implement compensating controls. Given the widespread use of consumer-grade networking equipment in European homes and small businesses, the threat surface is non-trivial.

Mitigation Recommendations

Organizations should first identify if Tenda AC1206 routers with the affected firmware version are in use within their networks. Immediate mitigation steps include isolating these devices from untrusted networks and restricting remote access to router management interfaces. Network segmentation can limit exposure. Disabling remote management features and changing default credentials reduces attack vectors. Monitoring network traffic for unusual activity targeting router management ports is advisable. Since no patches are currently available, organizations should consider replacing vulnerable devices with updated hardware or firmware versions from trusted vendors. Additionally, implementing network-level protections such as intrusion detection/prevention systems (IDS/IPS) can help detect and block exploitation attempts. Regularly reviewing vendor communications for updates or patches is critical. For environments where these routers are used, establishing incident response plans for potential denial of service scenarios will improve resilience.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec485

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/6/2025, 8:54:59 AM

Last updated: 2/7/2026, 3:53:10 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats