Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-42168: n/a in n/a

0
Critical
VulnerabilityCVE-2022-42168cvecve-2022-42168
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/fromSetIpMacBind.

AI-Powered Analysis

AILast updated: 07/06/2025, 09:12:20 UTC

Technical Analysis

CVE-2022-42168 is a critical stack overflow vulnerability identified in the Tenda AC10 router firmware version V15.03.06.23. The vulnerability exists in the handling of requests to the /goform/fromSetIpMacBind endpoint. A stack overflow occurs when the application writes more data to a buffer located on the stack than what is allocated, leading to memory corruption. This can allow an unauthenticated remote attacker to execute arbitrary code with the privileges of the affected service, potentially leading to full system compromise. The CVSS 3.1 base score of 9.8 reflects the high severity, with attack vector being network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is classified under CWE-787 (Out-of-bounds Write). No patches or vendor advisories are currently linked, and no known exploits in the wild have been reported as of the publication date. Given the nature of the flaw, exploitation could allow attackers to take control of the router, intercept or manipulate network traffic, or use the device as a foothold for further attacks within the network.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using Tenda AC10 routers in their network infrastructure. Compromise of these routers could lead to interception of sensitive data, disruption of network services, and unauthorized access to internal systems. This is particularly critical for enterprises, government agencies, and critical infrastructure operators that rely on secure and stable network connectivity. The ability to exploit this vulnerability remotely without authentication increases the attack surface and risk of widespread exploitation. Additionally, compromised routers could be leveraged to launch further attacks such as lateral movement, data exfiltration, or participation in botnets, amplifying the impact on organizational security and operational continuity.

Mitigation Recommendations

Organizations should immediately inventory their network devices to identify any Tenda AC10 routers running firmware version V15.03.06.23. Given the absence of an official patch, mitigation should include isolating affected devices from critical network segments and restricting access to the router management interfaces. Network-level protections such as firewall rules blocking external access to the /goform/fromSetIpMacBind endpoint should be implemented. Monitoring network traffic for unusual activity or signs of exploitation attempts is recommended. Where possible, replace vulnerable devices with models from vendors that provide timely security updates. Additionally, organizations should engage with Tenda support channels to obtain firmware updates or advisories and apply them as soon as they become available. Employing network segmentation and strict access controls can limit the potential damage if a device is compromised.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec50d

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/6/2025, 9:12:20 AM

Last updated: 2/7/2026, 5:13:24 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats