Multiple vulnerabilities in Tenda AC18



Published: 2022-05-27
Risk High
Patch available NO
Number of vulnerabilities 6
CVE-ID CVE-2022-30477
CVE-2022-30472
CVE-2022-30473
CVE-2022-30474
CVE-2022-30475
CVE-2022-30476
CWE-ID CWE-121
CWE-122
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #2 is available.
Public exploit code for vulnerability #3 is available.
Public exploit code for vulnerability #4 is available.
Public exploit code for vulnerability #5 is available.
Public exploit code for vulnerability #6 is available.
Vulnerable software
Subscribe
AC18
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Shenzhen Tenda Technology Co.,Ltd.

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Stack-based buffer overflow

EUVDB-ID: #VU63762

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-30477

CWE-ID: CWE-121 - Stack-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the httpd module when handling /goform/SetClientState request. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

AC18: 15.03.05.19(6318)


CPE2.3 External links

http://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/4

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

2) Stack-based buffer overflow

EUVDB-ID: #VU63772

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-30472

CWE-ID: CWE-121 - Stack-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the fromAddressNat function. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

AC18: 15.03.05.19(6318)


CPE2.3 External links

http://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/1

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

3) Stack-based buffer overflow

EUVDB-ID: #VU63771

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-30473

CWE-ID: CWE-121 - Stack-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the form_fast_setting_wifi_set function. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

AC18: 15.03.05.19(6318)


CPE2.3 External links

http://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/2

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

4) Heap-based buffer overflow

EUVDB-ID: #VU63768

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-30474

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the httpd module when handling /goform/saveParentControlInfo request. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

AC18: 15.03.05.19(6318)


CPE2.3 External links

http://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/5

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

5) Stack-based buffer overflow

EUVDB-ID: #VU63765

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-30475

CWE-ID: CWE-121 - Stack-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the httpd module when handling /goform/WifiExtraSet request. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

AC18: 15.03.05.19(6318)


CPE2.3 External links

http://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/3

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

6) Stack-based buffer overflow

EUVDB-ID: #VU63763

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-30476

CWE-ID: CWE-121 - Stack-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the httpd module when handling /goform/SetFirewallCfg request. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

AC18: 15.03.05.19(6318)


CPE2.3 External links

http://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/6

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###