CVE-2022-42165: n/a in n/a
Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetDeviceName.
AI Analysis
Technical Summary
CVE-2022-42165 is a critical stack overflow vulnerability identified in the Tenda AC10 router firmware version V15.03.06.23. The vulnerability exists in the handling of requests to the /goform/formSetDeviceName endpoint. Specifically, the flaw is a stack-based buffer overflow (CWE-787), which occurs when the device processes input data without proper bounds checking, allowing an attacker to overwrite the stack memory. This can lead to arbitrary code execution, denial of service, or complete compromise of the device. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score of 9.8 reflects the critical severity, with high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the ease of exploitation and the critical impact make this a significant threat. The lack of a vendor or product name in the report beyond the Tenda AC10 router suggests limited public information, but the vulnerability affects a widely used consumer-grade router model. The absence of an official patch link indicates that remediation may rely on vendor updates or workarounds not yet publicly available.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for small and medium enterprises (SMEs) and home offices that commonly deploy consumer-grade routers like the Tenda AC10. Exploitation could allow attackers to gain full control over the router, enabling interception or manipulation of network traffic, insertion of malicious payloads, or disruption of internet connectivity. This compromises confidentiality and integrity of sensitive communications and can lead to lateral movement within corporate networks if the router is a gateway device. Additionally, availability can be impacted through denial-of-service conditions caused by the overflow. Given the critical severity and remote exploitability without authentication, attackers could target vulnerable devices en masse to build botnets or conduct targeted espionage. The threat is particularly relevant in environments where network segmentation and device hardening are minimal, increasing the risk of broader network compromise.
Mitigation Recommendations
1. Immediate mitigation should include isolating the vulnerable Tenda AC10 routers from critical network segments and restricting remote access to the device management interface, especially from untrusted networks. 2. Network administrators should monitor network traffic for unusual activity or signs of exploitation attempts targeting the /goform/formSetDeviceName endpoint. 3. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect buffer overflow attack patterns or malformed HTTP requests. 4. If possible, disable remote management features on the router or restrict access via firewall rules to trusted IP addresses only. 5. Regularly check for firmware updates from Tenda and apply patches as soon as they become available. 6. Consider replacing vulnerable devices with models that have a stronger security track record and timely patch support. 7. Educate users about the risks of using outdated or unsupported network equipment and encourage best practices in network device management.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2022-42165: n/a in n/a
Description
Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetDeviceName.
AI-Powered Analysis
Technical Analysis
CVE-2022-42165 is a critical stack overflow vulnerability identified in the Tenda AC10 router firmware version V15.03.06.23. The vulnerability exists in the handling of requests to the /goform/formSetDeviceName endpoint. Specifically, the flaw is a stack-based buffer overflow (CWE-787), which occurs when the device processes input data without proper bounds checking, allowing an attacker to overwrite the stack memory. This can lead to arbitrary code execution, denial of service, or complete compromise of the device. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score of 9.8 reflects the critical severity, with high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the ease of exploitation and the critical impact make this a significant threat. The lack of a vendor or product name in the report beyond the Tenda AC10 router suggests limited public information, but the vulnerability affects a widely used consumer-grade router model. The absence of an official patch link indicates that remediation may rely on vendor updates or workarounds not yet publicly available.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for small and medium enterprises (SMEs) and home offices that commonly deploy consumer-grade routers like the Tenda AC10. Exploitation could allow attackers to gain full control over the router, enabling interception or manipulation of network traffic, insertion of malicious payloads, or disruption of internet connectivity. This compromises confidentiality and integrity of sensitive communications and can lead to lateral movement within corporate networks if the router is a gateway device. Additionally, availability can be impacted through denial-of-service conditions caused by the overflow. Given the critical severity and remote exploitability without authentication, attackers could target vulnerable devices en masse to build botnets or conduct targeted espionage. The threat is particularly relevant in environments where network segmentation and device hardening are minimal, increasing the risk of broader network compromise.
Mitigation Recommendations
1. Immediate mitigation should include isolating the vulnerable Tenda AC10 routers from critical network segments and restricting remote access to the device management interface, especially from untrusted networks. 2. Network administrators should monitor network traffic for unusual activity or signs of exploitation attempts targeting the /goform/formSetDeviceName endpoint. 3. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect buffer overflow attack patterns or malformed HTTP requests. 4. If possible, disable remote management features on the router or restrict access via firewall rules to trusted IP addresses only. 5. Regularly check for firmware updates from Tenda and apply patches as soon as they become available. 6. Consider replacing vulnerable devices with models that have a stronger security track record and timely patch support. 7. Educate users about the risks of using outdated or unsupported network equipment and encourage best practices in network device management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-03T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd637f
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/3/2025, 3:27:26 PM
Last updated: 7/31/2025, 3:54:07 PM
Views: 8
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.