CVE-2022-43103: n/a in n/a
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the list parameter in the formSetQosBand function.
AI Analysis
Technical Summary
CVE-2022-43103 is a critical stack overflow vulnerability identified in the Tenda AC23 router firmware version V16.03.07.45_cn. The flaw exists in the formSetQosBand function, specifically triggered via the 'list' parameter. A stack overflow occurs when more data is written to a buffer located on the stack than it can hold, which can lead to arbitrary code execution, denial of service, or system crashes. In this case, the vulnerability allows an unauthenticated remote attacker to send specially crafted requests to the affected device, causing the overflow without requiring user interaction or privileges. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Exploitation could enable attackers to execute arbitrary code with system-level privileges, potentially taking full control of the router. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a significant threat. The vulnerability is categorized under CWE-787 (Out-of-bounds Write), a common and dangerous class of memory corruption bugs. No official patches or mitigations have been linked yet, increasing the urgency for affected users to take protective measures.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on Tenda AC23 routers or similar devices in their network infrastructure. Compromise of a router can lead to interception and manipulation of network traffic, enabling attackers to conduct man-in-the-middle attacks, steal sensitive data, or pivot to internal systems. Given the critical nature of the vulnerability, attackers could disrupt business operations by causing denial of service or use the compromised device as a foothold for further attacks. Small and medium enterprises (SMEs) and home office setups using consumer-grade routers like Tenda AC23 are particularly vulnerable due to less stringent security controls. Additionally, sectors with high reliance on network availability and confidentiality, such as finance, healthcare, and government agencies, could face severe operational and reputational damage if targeted. The lack of available patches increases the window of exposure, making timely mitigation essential.
Mitigation Recommendations
1. Immediate mitigation should include isolating affected Tenda AC23 devices from critical network segments to limit potential impact. 2. Network administrators should monitor network traffic for unusual patterns indicative of exploitation attempts targeting the formSetQosBand function or related endpoints. 3. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect anomalies or known exploit signatures related to this vulnerability. 4. Where possible, replace or upgrade affected routers with models from vendors providing timely security updates and patches. 5. If replacement is not immediately feasible, consider disabling QoS features or restricting access to management interfaces to trusted internal networks only. 6. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 7. Stay informed through vendor advisories and cybersecurity information sharing platforms for any forthcoming patches or exploit disclosures.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2022-43103: n/a in n/a
Description
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the list parameter in the formSetQosBand function.
AI-Powered Analysis
Technical Analysis
CVE-2022-43103 is a critical stack overflow vulnerability identified in the Tenda AC23 router firmware version V16.03.07.45_cn. The flaw exists in the formSetQosBand function, specifically triggered via the 'list' parameter. A stack overflow occurs when more data is written to a buffer located on the stack than it can hold, which can lead to arbitrary code execution, denial of service, or system crashes. In this case, the vulnerability allows an unauthenticated remote attacker to send specially crafted requests to the affected device, causing the overflow without requiring user interaction or privileges. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Exploitation could enable attackers to execute arbitrary code with system-level privileges, potentially taking full control of the router. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a significant threat. The vulnerability is categorized under CWE-787 (Out-of-bounds Write), a common and dangerous class of memory corruption bugs. No official patches or mitigations have been linked yet, increasing the urgency for affected users to take protective measures.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on Tenda AC23 routers or similar devices in their network infrastructure. Compromise of a router can lead to interception and manipulation of network traffic, enabling attackers to conduct man-in-the-middle attacks, steal sensitive data, or pivot to internal systems. Given the critical nature of the vulnerability, attackers could disrupt business operations by causing denial of service or use the compromised device as a foothold for further attacks. Small and medium enterprises (SMEs) and home office setups using consumer-grade routers like Tenda AC23 are particularly vulnerable due to less stringent security controls. Additionally, sectors with high reliance on network availability and confidentiality, such as finance, healthcare, and government agencies, could face severe operational and reputational damage if targeted. The lack of available patches increases the window of exposure, making timely mitigation essential.
Mitigation Recommendations
1. Immediate mitigation should include isolating affected Tenda AC23 devices from critical network segments to limit potential impact. 2. Network administrators should monitor network traffic for unusual patterns indicative of exploitation attempts targeting the formSetQosBand function or related endpoints. 3. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect anomalies or known exploit signatures related to this vulnerability. 4. Where possible, replace or upgrade affected routers with models from vendors providing timely security updates and patches. 5. If replacement is not immediately feasible, consider disabling QoS features or restricting access to management interfaces to trusted internal networks only. 6. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 7. Stay informed through vendor advisories and cybersecurity information sharing platforms for any forthcoming patches or exploit disclosures.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-17T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdcc1f
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/3/2025, 1:59:53 PM
Last updated: 8/11/2025, 3:22:29 AM
Views: 13
Related Threats
CVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumCVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.