CVE-2022-42165: n/a in n/a
Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetDeviceName.
AI Analysis
Technical Summary
CVE-2022-42165 is a critical stack overflow vulnerability identified in the Tenda AC10 router firmware version V15.03.06.23. The vulnerability exists in the handling of requests to the /goform/formSetDeviceName endpoint. Specifically, the flaw is a stack-based buffer overflow (CWE-787), which occurs when the device processes input data without proper bounds checking, allowing an attacker to overwrite the stack memory. This can lead to arbitrary code execution, denial of service, or complete compromise of the device. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score of 9.8 reflects the critical severity, with high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the ease of exploitation and the critical impact make this a significant threat. The lack of a vendor or product name in the report beyond the Tenda AC10 router suggests limited public information, but the vulnerability affects a widely used consumer-grade router model. The absence of an official patch link indicates that remediation may rely on vendor updates or workarounds not yet publicly available.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for small and medium enterprises (SMEs) and home offices that commonly deploy consumer-grade routers like the Tenda AC10. Exploitation could allow attackers to gain full control over the router, enabling interception or manipulation of network traffic, insertion of malicious payloads, or disruption of internet connectivity. This compromises confidentiality and integrity of sensitive communications and can lead to lateral movement within corporate networks if the router is a gateway device. Additionally, availability can be impacted through denial-of-service conditions caused by the overflow. Given the critical severity and remote exploitability without authentication, attackers could target vulnerable devices en masse to build botnets or conduct targeted espionage. The threat is particularly relevant in environments where network segmentation and device hardening are minimal, increasing the risk of broader network compromise.
Mitigation Recommendations
1. Immediate mitigation should include isolating the vulnerable Tenda AC10 routers from critical network segments and restricting remote access to the device management interface, especially from untrusted networks. 2. Network administrators should monitor network traffic for unusual activity or signs of exploitation attempts targeting the /goform/formSetDeviceName endpoint. 3. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect buffer overflow attack patterns or malformed HTTP requests. 4. If possible, disable remote management features on the router or restrict access via firewall rules to trusted IP addresses only. 5. Regularly check for firmware updates from Tenda and apply patches as soon as they become available. 6. Consider replacing vulnerable devices with models that have a stronger security track record and timely patch support. 7. Educate users about the risks of using outdated or unsupported network equipment and encourage best practices in network device management.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2022-42165: n/a in n/a
Description
Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetDeviceName.
AI-Powered Analysis
Technical Analysis
CVE-2022-42165 is a critical stack overflow vulnerability identified in the Tenda AC10 router firmware version V15.03.06.23. The vulnerability exists in the handling of requests to the /goform/formSetDeviceName endpoint. Specifically, the flaw is a stack-based buffer overflow (CWE-787), which occurs when the device processes input data without proper bounds checking, allowing an attacker to overwrite the stack memory. This can lead to arbitrary code execution, denial of service, or complete compromise of the device. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score of 9.8 reflects the critical severity, with high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the ease of exploitation and the critical impact make this a significant threat. The lack of a vendor or product name in the report beyond the Tenda AC10 router suggests limited public information, but the vulnerability affects a widely used consumer-grade router model. The absence of an official patch link indicates that remediation may rely on vendor updates or workarounds not yet publicly available.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for small and medium enterprises (SMEs) and home offices that commonly deploy consumer-grade routers like the Tenda AC10. Exploitation could allow attackers to gain full control over the router, enabling interception or manipulation of network traffic, insertion of malicious payloads, or disruption of internet connectivity. This compromises confidentiality and integrity of sensitive communications and can lead to lateral movement within corporate networks if the router is a gateway device. Additionally, availability can be impacted through denial-of-service conditions caused by the overflow. Given the critical severity and remote exploitability without authentication, attackers could target vulnerable devices en masse to build botnets or conduct targeted espionage. The threat is particularly relevant in environments where network segmentation and device hardening are minimal, increasing the risk of broader network compromise.
Mitigation Recommendations
1. Immediate mitigation should include isolating the vulnerable Tenda AC10 routers from critical network segments and restricting remote access to the device management interface, especially from untrusted networks. 2. Network administrators should monitor network traffic for unusual activity or signs of exploitation attempts targeting the /goform/formSetDeviceName endpoint. 3. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect buffer overflow attack patterns or malformed HTTP requests. 4. If possible, disable remote management features on the router or restrict access via firewall rules to trusted IP addresses only. 5. Regularly check for firmware updates from Tenda and apply patches as soon as they become available. 6. Consider replacing vulnerable devices with models that have a stronger security track record and timely patch support. 7. Educate users about the risks of using outdated or unsupported network equipment and encourage best practices in network device management.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-03T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd637f
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/3/2025, 3:27:26 PM
Last updated: 2/4/2026, 2:51:54 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-69618: n/a
UnknownCVE-2024-45326: Improper access control in Fortinet FortiDeceptor
LowCVE-2025-14740: CWE-732 Incorrect Permission Assignment for Critical Resource in Docker Inc. Docker Desktop
MediumCVE-2024-35280: Execute unauthorized code or commands in Fortinet FortiDeceptor
MediumCVE-2025-5329: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Martcode Software Inc. Delta Course Automation
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.