Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-42164: n/a in n/a

0
Critical
VulnerabilityCVE-2022-42164cvecve-2022-42164
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetClientState.

AI-Powered Analysis

AILast updated: 07/06/2025, 08:57:02 UTC

Technical Analysis

CVE-2022-42164 is a critical stack overflow vulnerability identified in the Tenda AC10 router firmware version V15.03.06.23. The vulnerability exists in the handling of requests to the /goform/formSetClientState endpoint. A stack overflow occurs when the application writes more data to a buffer located on the stack than what is actually allocated, which can overwrite adjacent memory and lead to arbitrary code execution, denial of service, or system compromise. This vulnerability is classified under CWE-787 (Out-of-bounds Write), indicating that the flaw arises from improper bounds checking on input data. The CVSS v3.1 score of 9.8 reflects the high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker can fully compromise the device remotely without authentication. Although no known exploits in the wild have been reported, the critical nature and ease of exploitation make this vulnerability a significant threat to affected devices. The lack of vendor or product details beyond the Tenda AC10 model and firmware version limits the scope of direct vendor mitigation information, and no patch links are currently available, indicating that users must rely on vendor updates or mitigations once released. The vulnerability's presence in a widely used consumer and small office/home office (SOHO) router model raises concerns about potential exploitation for network infiltration, lateral movement, or as part of botnet recruitment campaigns.

Potential Impact

For European organizations, the exploitation of CVE-2022-42164 could have severe consequences. The Tenda AC10 router is commonly used in residential and small business environments, which are often less protected than enterprise-grade infrastructure. Successful exploitation could allow attackers to gain full control over the router, enabling interception and manipulation of network traffic, deployment of malware, or pivoting into internal networks. This could lead to data breaches, disruption of business operations, and compromise of connected devices. Given the criticality and remote exploitability without authentication, attackers could target vulnerable routers en masse, potentially impacting supply chains or remote workers. The impact is particularly significant for organizations with remote or hybrid workforces relying on such routers for internet connectivity. Additionally, compromised routers could be leveraged as part of larger distributed denial-of-service (DDoS) attacks or other malicious campaigns affecting European digital infrastructure.

Mitigation Recommendations

Immediate mitigation steps include: 1) Identifying and inventorying all Tenda AC10 routers within the organization’s network, including those used by remote employees. 2) Monitoring vendor communications and security advisories for official patches or firmware updates addressing this vulnerability, and applying them promptly upon release. 3) If patches are not yet available, consider temporarily isolating affected devices from critical network segments or the internet to reduce exposure. 4) Implement network-level protections such as firewall rules to restrict access to router management interfaces, especially blocking external access to the /goform/formSetClientState endpoint if possible. 5) Employ network intrusion detection/prevention systems (IDS/IPS) to detect anomalous traffic patterns indicative of exploitation attempts targeting this vulnerability. 6) Educate users about the risks of using outdated router firmware and encourage regular updates. 7) For organizations providing routers to employees, consider replacing vulnerable models with devices from vendors with robust security update practices. These measures go beyond generic advice by focusing on device-specific inventory, network segmentation, and proactive monitoring tailored to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec4cf

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/6/2025, 8:57:02 AM

Last updated: 2/7/2026, 6:16:01 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats