CVE-2022-42166: n/a in n/a
Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetSpeedWan.
AI Analysis
Technical Summary
CVE-2022-42166 is a critical stack overflow vulnerability identified in the Tenda AC10 router firmware version V15.03.06.23. The vulnerability exists in the handling of requests to the /goform/formSetSpeedWan endpoint. A stack overflow occurs when the application writes more data to a buffer located on the stack than it can hold, potentially overwriting adjacent memory. This can lead to arbitrary code execution, denial of service, or system compromise. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS score of 9.8 reflects the high impact on confidentiality, integrity, and availability, meaning an attacker can fully compromise the device, intercept or manipulate network traffic, or disrupt network connectivity. The CWE-787 classification confirms this is a classic stack-based buffer overflow issue. No patches or vendor advisories are currently linked, and no known exploits in the wild have been reported yet. However, given the critical severity and ease of exploitation, this vulnerability poses a significant risk to affected devices.
Potential Impact
For European organizations, the exploitation of this vulnerability in Tenda AC10 routers could lead to severe network security breaches. Compromised routers can serve as entry points for attackers to infiltrate internal networks, intercept sensitive communications, or launch further attacks such as lateral movement or data exfiltration. The integrity and availability of network services could be disrupted, impacting business operations. Small and medium enterprises (SMEs) and home office setups using these routers are particularly at risk due to typically weaker network defenses. Additionally, critical infrastructure or public sector entities using these devices could face operational disruptions or espionage risks. The lack of authentication and user interaction requirements makes automated exploitation feasible, increasing the threat level. Given the widespread use of Tenda routers in residential and small business environments across Europe, this vulnerability could facilitate large-scale botnet recruitment or distributed denial-of-service (DDoS) attacks originating from compromised devices.
Mitigation Recommendations
Organizations should immediately identify and inventory any Tenda AC10 routers running firmware version V15.03.06.23. Until an official patch is released, it is recommended to isolate these devices from critical network segments and restrict inbound access to the router management interfaces, especially from untrusted networks. Network administrators should implement strict firewall rules to block access to the /goform/formSetSpeedWan endpoint or the router’s web management interface from external sources. Monitoring network traffic for unusual patterns or signs of exploitation attempts is advised. Where possible, replace vulnerable devices with models from vendors with active security support. Users should disable remote management features and change default credentials to strong, unique passwords. Regular firmware updates should be applied once patches become available. Additionally, network segmentation and intrusion detection systems can help limit the impact of a compromised router.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2022-42166: n/a in n/a
Description
Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetSpeedWan.
AI-Powered Analysis
Technical Analysis
CVE-2022-42166 is a critical stack overflow vulnerability identified in the Tenda AC10 router firmware version V15.03.06.23. The vulnerability exists in the handling of requests to the /goform/formSetSpeedWan endpoint. A stack overflow occurs when the application writes more data to a buffer located on the stack than it can hold, potentially overwriting adjacent memory. This can lead to arbitrary code execution, denial of service, or system compromise. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS score of 9.8 reflects the high impact on confidentiality, integrity, and availability, meaning an attacker can fully compromise the device, intercept or manipulate network traffic, or disrupt network connectivity. The CWE-787 classification confirms this is a classic stack-based buffer overflow issue. No patches or vendor advisories are currently linked, and no known exploits in the wild have been reported yet. However, given the critical severity and ease of exploitation, this vulnerability poses a significant risk to affected devices.
Potential Impact
For European organizations, the exploitation of this vulnerability in Tenda AC10 routers could lead to severe network security breaches. Compromised routers can serve as entry points for attackers to infiltrate internal networks, intercept sensitive communications, or launch further attacks such as lateral movement or data exfiltration. The integrity and availability of network services could be disrupted, impacting business operations. Small and medium enterprises (SMEs) and home office setups using these routers are particularly at risk due to typically weaker network defenses. Additionally, critical infrastructure or public sector entities using these devices could face operational disruptions or espionage risks. The lack of authentication and user interaction requirements makes automated exploitation feasible, increasing the threat level. Given the widespread use of Tenda routers in residential and small business environments across Europe, this vulnerability could facilitate large-scale botnet recruitment or distributed denial-of-service (DDoS) attacks originating from compromised devices.
Mitigation Recommendations
Organizations should immediately identify and inventory any Tenda AC10 routers running firmware version V15.03.06.23. Until an official patch is released, it is recommended to isolate these devices from critical network segments and restrict inbound access to the router management interfaces, especially from untrusted networks. Network administrators should implement strict firewall rules to block access to the /goform/formSetSpeedWan endpoint or the router’s web management interface from external sources. Monitoring network traffic for unusual patterns or signs of exploitation attempts is advised. Where possible, replace vulnerable devices with models from vendors with active security support. Users should disable remote management features and change default credentials to strong, unique passwords. Regular firmware updates should be applied once patches become available. Additionally, network segmentation and intrusion detection systems can help limit the impact of a compromised router.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-03T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd60ac
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/3/2025, 3:27:03 PM
Last updated: 2/7/2026, 12:57:47 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.