Skip to main content

CVE-2022-42165: n/a in n/a

Critical
VulnerabilityCVE-2022-42165cvecve-2022-42165
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetDeviceName.

AI-Powered Analysis

AILast updated: 07/03/2025, 15:27:26 UTC

Technical Analysis

CVE-2022-42165 is a critical stack overflow vulnerability identified in the Tenda AC10 router firmware version V15.03.06.23. The vulnerability exists in the handling of requests to the /goform/formSetDeviceName endpoint. Specifically, the flaw is a stack-based buffer overflow (CWE-787), which occurs when the device processes input data without proper bounds checking, allowing an attacker to overwrite the stack memory. This can lead to arbitrary code execution, denial of service, or complete compromise of the device. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score of 9.8 reflects the critical severity, with high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the ease of exploitation and the critical impact make this a significant threat. The lack of a vendor or product name in the report beyond the Tenda AC10 router suggests limited public information, but the vulnerability affects a widely used consumer-grade router model. The absence of an official patch link indicates that remediation may rely on vendor updates or workarounds not yet publicly available.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for small and medium enterprises (SMEs) and home offices that commonly deploy consumer-grade routers like the Tenda AC10. Exploitation could allow attackers to gain full control over the router, enabling interception or manipulation of network traffic, insertion of malicious payloads, or disruption of internet connectivity. This compromises confidentiality and integrity of sensitive communications and can lead to lateral movement within corporate networks if the router is a gateway device. Additionally, availability can be impacted through denial-of-service conditions caused by the overflow. Given the critical severity and remote exploitability without authentication, attackers could target vulnerable devices en masse to build botnets or conduct targeted espionage. The threat is particularly relevant in environments where network segmentation and device hardening are minimal, increasing the risk of broader network compromise.

Mitigation Recommendations

1. Immediate mitigation should include isolating the vulnerable Tenda AC10 routers from critical network segments and restricting remote access to the device management interface, especially from untrusted networks. 2. Network administrators should monitor network traffic for unusual activity or signs of exploitation attempts targeting the /goform/formSetDeviceName endpoint. 3. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect buffer overflow attack patterns or malformed HTTP requests. 4. If possible, disable remote management features on the router or restrict access via firewall rules to trusted IP addresses only. 5. Regularly check for firmware updates from Tenda and apply patches as soon as they become available. 6. Consider replacing vulnerable devices with models that have a stronger security track record and timely patch support. 7. Educate users about the risks of using outdated or unsupported network equipment and encourage best practices in network device management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd637f

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/3/2025, 3:27:26 PM

Last updated: 7/31/2025, 3:54:07 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats