Skip to main content

CVE-2022-43103: n/a in n/a

Critical
VulnerabilityCVE-2022-43103cvecve-2022-43103
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the list parameter in the formSetQosBand function.

AI-Powered Analysis

AILast updated: 07/03/2025, 13:59:53 UTC

Technical Analysis

CVE-2022-43103 is a critical stack overflow vulnerability identified in the Tenda AC23 router firmware version V16.03.07.45_cn. The flaw exists in the formSetQosBand function, specifically triggered via the 'list' parameter. A stack overflow occurs when more data is written to a buffer located on the stack than it can hold, which can lead to arbitrary code execution, denial of service, or system crashes. In this case, the vulnerability allows an unauthenticated remote attacker to send specially crafted requests to the affected device, causing the overflow without requiring user interaction or privileges. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Exploitation could enable attackers to execute arbitrary code with system-level privileges, potentially taking full control of the router. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a significant threat. The vulnerability is categorized under CWE-787 (Out-of-bounds Write), a common and dangerous class of memory corruption bugs. No official patches or mitigations have been linked yet, increasing the urgency for affected users to take protective measures.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on Tenda AC23 routers or similar devices in their network infrastructure. Compromise of a router can lead to interception and manipulation of network traffic, enabling attackers to conduct man-in-the-middle attacks, steal sensitive data, or pivot to internal systems. Given the critical nature of the vulnerability, attackers could disrupt business operations by causing denial of service or use the compromised device as a foothold for further attacks. Small and medium enterprises (SMEs) and home office setups using consumer-grade routers like Tenda AC23 are particularly vulnerable due to less stringent security controls. Additionally, sectors with high reliance on network availability and confidentiality, such as finance, healthcare, and government agencies, could face severe operational and reputational damage if targeted. The lack of available patches increases the window of exposure, making timely mitigation essential.

Mitigation Recommendations

1. Immediate mitigation should include isolating affected Tenda AC23 devices from critical network segments to limit potential impact. 2. Network administrators should monitor network traffic for unusual patterns indicative of exploitation attempts targeting the formSetQosBand function or related endpoints. 3. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect anomalies or known exploit signatures related to this vulnerability. 4. Where possible, replace or upgrade affected routers with models from vendors providing timely security updates and patches. 5. If replacement is not immediately feasible, consider disabling QoS features or restricting access to management interfaces to trusted internal networks only. 6. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 7. Stay informed through vendor advisories and cybersecurity information sharing platforms for any forthcoming patches or exploit disclosures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdcc1f

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 1:59:53 PM

Last updated: 8/11/2025, 3:22:29 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats