CVE-2022-40855
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Tenda W20E router V15.11.0.6 contains a stack overflow in the function formSetPortMapping with post request 'goform/setPortMapping/'. This vulnerability allows attackers to cause a Denial of Service (DoS) or Remote Code Execution (RCE) via the portMappingServer, portMappingProtocol, portMappingWan, porMappingtInternal, and portMappingExternal parameters.
El router Tenda W20E versión V15.11.0.6, contiene un desbordamiento de pila en la función formSetPortMapping con la petición /goform/setPortMapping/. Esta vulnerabilidad permite a atacantes causar una Denegación de Servicio (DoS) o una Ejecución de Código Remota (RCE) por medio de los parámetros portMappingServer, portMappingProtocol, portMappingWan, porMappingtInternal y portMappingExternal.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-09-19 CVE Reserved
- 2022-09-23 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2024-09-07 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formSetPortMapping.md | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tenda Search vendor "Tenda" | W20e Firmware Search vendor "Tenda" for product "W20e Firmware" | 15.11.0.6 Search vendor "Tenda" for product "W20e Firmware" and version "15.11.0.6" | - |
Affected
| in | Tenda Search vendor "Tenda" | W20e Search vendor "Tenda" for product "W20e" | - | - |
Safe
|