// For flags

CVE-2022-40843

 

Severity Score

4.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router is vulnerable to improper authorization / improper session management that allows the router login page to be bypassed. This leads to authenticated attackers having the ability to read the routers syslog.log file which contains the MD5 password of the Administrator's user account.

Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router es vulnerable a una autorización inadecuada/gestión de sesión incorrecta que permite omitir la página de inicio de sesión del router. Esto lleva a que los atacantes autenticados tengan la capacidad de leer el archivo syslog.log del router que contiene la contraseña MD5 de la cuenta de usuario del administrador.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-19 CVE Reserved
  • 2022-11-15 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • 2024-10-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (1)
URL Tag Source
URL Date SRC
https://boschko.ca/tenda_ac1200_router 2024-08-03
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tenda
Search vendor "Tenda"
W15e Firmware
Search vendor "Tenda" for product "W15e Firmware"
15.11.0.10\(1576\)
Search vendor "Tenda" for product "W15e Firmware" and version "15.11.0.10\(1576\)"
-
Affected
in Tenda
Search vendor "Tenda"
Ac1200 V-w15ev2
Search vendor "Tenda" for product "Ac1200 V-w15ev2"
--
Safe