Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-40843

EPSS 40.40% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-40843

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router is vulnerable to improper authorization / improper session management that allows the router login page to be bypassed. This leads to authenticated attackers having the ability to read the routers syslog.log file which contains the MD5 password of the Administrator's user account.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Tenda AC1200 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Tenda AC1200是中国腾达(Tenda)公司的一款无线路由器。 Tenda AC1200 15.11.0.10 版本存在安全漏洞,该漏洞源于路由器容易受到不正确授权的攻击,从而允许绕过路由器登录页面。经过身份验证的攻击者通过该漏洞能够读取路由器 syslog.log 文件,其中包含管理员用户帐户的 MD5 密码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-40843

#POC DescriptionSource LinkShenlong Link
1The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router's login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router's file, which contains the MD5 password of the Administrator's user account. This vulnerability exists within the local web and hosted remote management console. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-40843.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-40843

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-11-15 · 41 CVEs total

CVE-2022-42128Liferay Portal和Liferay DXP 安全漏洞
CVE-2022-42119Liferay Portal和Liferay DXP 跨站脚本漏洞
CVE-2022-42120Liferay Portal和Liferay DXP SQL注入漏洞
CVE-2022-42121Liferay Portal和Liferay DXP SQL注入漏洞
CVE-2022-42122Liferay Portal和Liferay DXP SQL注入漏洞
CVE-2022-42123Liferay Portal和Liferay DXP 路径遍历漏洞
CVE-2022-42124Liferay Portal和Liferay DXP 安全漏洞
CVE-2022-42125Liferay Portal和Liferay DXP 路径遍历漏洞
CVE-2022-42126Liferay Portal和Liferay DXP 安全漏洞
CVE-2022-42127Liferay Portal和Liferay DXP 安全漏洞
CVE-2022-42118Liferay Portal和Liferay DXP 跨站脚本漏洞
CVE-2022-42129Liferay Portal和Liferay DXP 安全漏洞
CVE-2022-42130Liferay Portal和Liferay DXP 安全漏洞
CVE-2022-42131Liferay Portal和Liferay DXP 信任管理问题漏洞
CVE-2022-42132Liferay Portal和Liferay DXP 信息泄露漏洞
CVE-2022-42977Atlassian Confluence 路径遍历漏洞
CVE-2022-42978Atlassian Confluence 安全漏洞
CVE-2022-43071XPDF 缓冲区错误漏洞
CVE-2022-43265Canteen Management System 代码问题漏洞
CVE-2022-43279LimeSurvey SQL注入漏洞

Showing top 20 of 41 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-40843

No comments yet


Leave a comment