// For flags

CVE-2022-40876

 

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In Tenda ax1803 v1.0.0.1, the http requests handled by the fromAdvSetMacMtuWan functions, wanSpeed, cloneType, mac, can cause a stack overflow and enable remote code execution (RCE).

En Tenda ax1803 v1.0.0.1, las solicitudes http manejadas por las funciones fromAdvSetMacMtuWan, wanSpeed, cloneType, mac, pueden provocar un Desbordamiento del Búfer y habilitar la ejecución remota de código (RCE).

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-19 CVE Reserved
  • 2022-10-27 CVE Published
  • 2024-05-19 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tenda
Search vendor "Tenda"
Ax1803 Firmware
Search vendor "Tenda" for product "Ax1803 Firmware"
1.0.0.1
Search vendor "Tenda" for product "Ax1803 Firmware" and version "1.0.0.1"
-
Affected
in Tenda
Search vendor "Tenda"
Ax1803
Search vendor "Tenda" for product "Ax1803"
--
Safe