Skip to main content

CVE-2022-42168: n/a in n/a

Critical
VulnerabilityCVE-2022-42168cvecve-2022-42168
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/fromSetIpMacBind.

AI-Powered Analysis

AILast updated: 07/06/2025, 09:12:20 UTC

Technical Analysis

CVE-2022-42168 is a critical stack overflow vulnerability identified in the Tenda AC10 router firmware version V15.03.06.23. The vulnerability exists in the handling of requests to the /goform/fromSetIpMacBind endpoint. A stack overflow occurs when the application writes more data to a buffer located on the stack than what is allocated, leading to memory corruption. This can allow an unauthenticated remote attacker to execute arbitrary code with the privileges of the affected service, potentially leading to full system compromise. The CVSS 3.1 base score of 9.8 reflects the high severity, with attack vector being network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is classified under CWE-787 (Out-of-bounds Write). No patches or vendor advisories are currently linked, and no known exploits in the wild have been reported as of the publication date. Given the nature of the flaw, exploitation could allow attackers to take control of the router, intercept or manipulate network traffic, or use the device as a foothold for further attacks within the network.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using Tenda AC10 routers in their network infrastructure. Compromise of these routers could lead to interception of sensitive data, disruption of network services, and unauthorized access to internal systems. This is particularly critical for enterprises, government agencies, and critical infrastructure operators that rely on secure and stable network connectivity. The ability to exploit this vulnerability remotely without authentication increases the attack surface and risk of widespread exploitation. Additionally, compromised routers could be leveraged to launch further attacks such as lateral movement, data exfiltration, or participation in botnets, amplifying the impact on organizational security and operational continuity.

Mitigation Recommendations

Organizations should immediately inventory their network devices to identify any Tenda AC10 routers running firmware version V15.03.06.23. Given the absence of an official patch, mitigation should include isolating affected devices from critical network segments and restricting access to the router management interfaces. Network-level protections such as firewall rules blocking external access to the /goform/fromSetIpMacBind endpoint should be implemented. Monitoring network traffic for unusual activity or signs of exploitation attempts is recommended. Where possible, replace vulnerable devices with models from vendors that provide timely security updates. Additionally, organizations should engage with Tenda support channels to obtain firmware updates or advisories and apply them as soon as they become available. Employing network segmentation and strict access controls can limit the potential damage if a device is compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec50d

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/6/2025, 9:12:20 AM

Last updated: 8/4/2025, 7:08:44 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats