Skip to main content

CVE-2022-42164: n/a in n/a

Critical
VulnerabilityCVE-2022-42164cvecve-2022-42164
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetClientState.

AI-Powered Analysis

AILast updated: 07/06/2025, 08:57:02 UTC

Technical Analysis

CVE-2022-42164 is a critical stack overflow vulnerability identified in the Tenda AC10 router firmware version V15.03.06.23. The vulnerability exists in the handling of requests to the /goform/formSetClientState endpoint. A stack overflow occurs when the application writes more data to a buffer located on the stack than what is actually allocated, which can overwrite adjacent memory and lead to arbitrary code execution, denial of service, or system compromise. This vulnerability is classified under CWE-787 (Out-of-bounds Write), indicating that the flaw arises from improper bounds checking on input data. The CVSS v3.1 score of 9.8 reflects the high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker can fully compromise the device remotely without authentication. Although no known exploits in the wild have been reported, the critical nature and ease of exploitation make this vulnerability a significant threat to affected devices. The lack of vendor or product details beyond the Tenda AC10 model and firmware version limits the scope of direct vendor mitigation information, and no patch links are currently available, indicating that users must rely on vendor updates or mitigations once released. The vulnerability's presence in a widely used consumer and small office/home office (SOHO) router model raises concerns about potential exploitation for network infiltration, lateral movement, or as part of botnet recruitment campaigns.

Potential Impact

For European organizations, the exploitation of CVE-2022-42164 could have severe consequences. The Tenda AC10 router is commonly used in residential and small business environments, which are often less protected than enterprise-grade infrastructure. Successful exploitation could allow attackers to gain full control over the router, enabling interception and manipulation of network traffic, deployment of malware, or pivoting into internal networks. This could lead to data breaches, disruption of business operations, and compromise of connected devices. Given the criticality and remote exploitability without authentication, attackers could target vulnerable routers en masse, potentially impacting supply chains or remote workers. The impact is particularly significant for organizations with remote or hybrid workforces relying on such routers for internet connectivity. Additionally, compromised routers could be leveraged as part of larger distributed denial-of-service (DDoS) attacks or other malicious campaigns affecting European digital infrastructure.

Mitigation Recommendations

Immediate mitigation steps include: 1) Identifying and inventorying all Tenda AC10 routers within the organization’s network, including those used by remote employees. 2) Monitoring vendor communications and security advisories for official patches or firmware updates addressing this vulnerability, and applying them promptly upon release. 3) If patches are not yet available, consider temporarily isolating affected devices from critical network segments or the internet to reduce exposure. 4) Implement network-level protections such as firewall rules to restrict access to router management interfaces, especially blocking external access to the /goform/formSetClientState endpoint if possible. 5) Employ network intrusion detection/prevention systems (IDS/IPS) to detect anomalous traffic patterns indicative of exploitation attempts targeting this vulnerability. 6) Educate users about the risks of using outdated router firmware and encourage regular updates. 7) For organizations providing routers to employees, consider replacing vulnerable models with devices from vendors with robust security update practices. These measures go beyond generic advice by focusing on device-specific inventory, network segmentation, and proactive monitoring tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec4cf

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/6/2025, 8:57:02 AM

Last updated: 7/31/2025, 9:51:18 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats