Skip to main content

CVE-2022-42080: n/a in n/a

High
VulnerabilityCVE-2022-42080cvecve-2022-42080
Published: Wed Oct 12 2022 (10/12/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a heap overflow via sched_start_time parameter.

AI-Powered Analysis

AILast updated: 07/06/2025, 08:55:12 UTC

Technical Analysis

CVE-2022-42080 is a high-severity heap overflow vulnerability identified in the firmware of the Tenda AC1206 router model, specifically version US_AC1206V1.0RTL_V15.03.06.23_multi_TD01. The vulnerability arises from improper handling of the 'sched_start_time' parameter, which allows an attacker to trigger a heap overflow condition. Heap overflows occur when data is written beyond the boundaries of allocated heap memory, potentially leading to memory corruption. This can cause denial of service (DoS) by crashing the device or, in some cases, enable remote code execution if exploited skillfully. The CVSS v3.1 score of 7.5 reflects a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:H), with no direct confidentiality or integrity impact reported. The vulnerability does not require authentication, making it accessible to unauthenticated remote attackers over the network. Although no known exploits are currently reported in the wild, the vulnerability's characteristics suggest it could be leveraged for disruptive attacks against affected devices. The CWE classification CWE-787 confirms this is a classic heap-based buffer overflow issue. No official patches or vendor advisories are currently linked, indicating that affected users should be vigilant and consider mitigation strategies proactively. The lack of detailed vendor or product information beyond the Tenda AC1206 model limits the scope of affected devices but confirms the vulnerability is specific to this router firmware version.

Potential Impact

For European organizations, the impact of CVE-2022-42080 can be significant, especially for those relying on Tenda AC1206 routers in their network infrastructure. The heap overflow vulnerability can be exploited remotely without authentication, potentially allowing attackers to cause denial of service conditions, disrupting network connectivity and availability of critical services. This is particularly concerning for small and medium enterprises (SMEs) or branch offices that may use consumer-grade or lower-cost networking equipment like Tenda routers. Disruption of network availability can affect business operations, remote work capabilities, and access to cloud or internal resources. While the vulnerability does not directly compromise confidentiality or integrity, the resulting DoS can be leveraged as part of multi-stage attacks or to distract security teams. Furthermore, the absence of patches increases the risk exposure. European organizations with limited network segmentation or those that expose such devices to the internet are at higher risk. The impact extends to residential users and small businesses, which can indirectly affect larger organizations through supply chain or partner disruptions.

Mitigation Recommendations

1. Immediate mitigation should include isolating affected Tenda AC1206 devices from untrusted networks, especially the internet, to reduce exposure to remote attacks. 2. Network administrators should implement strict firewall rules to restrict access to router management interfaces and services, limiting them to trusted internal IP addresses only. 3. Monitor network traffic for unusual patterns or repeated attempts to exploit the 'sched_start_time' parameter, which may indicate scanning or exploitation attempts. 4. Where possible, replace affected Tenda AC1206 routers with devices from vendors that provide timely security updates and have a strong security track record. 5. If replacement is not immediately feasible, consider deploying network-level intrusion prevention systems (IPS) that can detect and block heap overflow exploit attempts targeting this vulnerability. 6. Regularly check for vendor firmware updates or security advisories addressing this vulnerability and apply patches promptly once available. 7. Educate IT staff about this vulnerability to ensure rapid response to any incidents involving affected devices. 8. Implement network segmentation to limit the impact of compromised devices and protect critical infrastructure from being affected by DoS or other attacks stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec487

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/6/2025, 8:55:12 AM

Last updated: 7/25/2025, 6:24:24 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats