Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-43107: n/a in n/a

0
Critical
VulnerabilityCVE-2022-43107cvecve-2022-43107
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the time parameter in the setSmartPowerManagement function.

AI-Powered Analysis

AILast updated: 07/03/2025, 06:56:38 UTC

Technical Analysis

CVE-2022-43107 is a critical stack overflow vulnerability identified in the Tenda AC23 router firmware version V16.03.07.45_cn. The vulnerability arises from improper handling of the 'time' parameter within the setSmartPowerManagement function. Specifically, the function does not adequately validate or limit the input size for this parameter, leading to a stack-based buffer overflow (CWE-787). This type of vulnerability allows an attacker to overwrite the stack memory, potentially enabling arbitrary code execution, denial of service, or complete compromise of the device. The CVSS v3.1 base score of 9.8 reflects the high severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), indicating that exploitation could lead to full control over the device. Although no known exploits are currently reported in the wild, the vulnerability's nature and ease of exploitation make it a significant threat. The affected product is a consumer-grade wireless router widely used in various markets, including Europe, for home and small office networking. The lack of an official patch or vendor-provided mitigation at the time of publication increases the urgency for affected users to apply workarounds or consider device replacement. Given the router's role as a network gateway, successful exploitation could allow attackers to intercept, manipulate, or disrupt network traffic, potentially impacting connected devices and data confidentiality within the network environment.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Tenda AC23 routers, this vulnerability poses a critical risk. Exploitation could lead to unauthorized network access, interception of sensitive communications, and lateral movement within internal networks. This is particularly concerning for organizations handling personal data under GDPR regulations, as a breach could result in significant compliance violations and financial penalties. The compromise of network infrastructure devices like routers can also disrupt business continuity by causing denial of service or enabling further attacks such as ransomware or data exfiltration. Given the router's typical deployment at network perimeters, the vulnerability could serve as an entry point for attackers targeting European entities. Additionally, the absence of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of automated attacks or wormable scenarios. The potential impact extends beyond individual organizations to critical infrastructure sectors that may use similar devices, amplifying the threat to national cybersecurity.

Mitigation Recommendations

1. Immediate mitigation should include isolating the affected Tenda AC23 routers from critical network segments to limit exposure. 2. Network administrators should monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected outbound connections or anomalous packets targeting router management interfaces. 3. Where possible, disable or restrict remote management features on the router to reduce attack surface. 4. Implement network segmentation to contain potential breaches and prevent lateral movement. 5. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts targeting this vulnerability. 6. Regularly check for firmware updates from Tenda or trusted security advisories; apply patches promptly once available. 7. Consider replacing vulnerable devices with routers from vendors with robust security update policies if patches are delayed or unavailable. 8. Educate users and administrators about the risks associated with outdated network devices and the importance of timely updates. 9. For organizations with critical data, implement additional layers of encryption and endpoint security to mitigate risks from compromised network devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbebaad

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 7/3/2025, 6:56:38 AM

Last updated: 2/2/2026, 8:31:19 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20418: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT7931, MT7933

Unknown
VulnerabilityMon Feb 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats