Vulnerability Description
There is a stack overflow vulnerability in the SetSysTimeCfg() function in the httpd service of Tenda AC9 V15.03.2.21_cn. The attacker can obtain a stable root shell through a constructed payload.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Ac9 Firmware | 15.03.2.21_cn |
| Tenda | Ac9 | - |
Related Weaknesses (CWE)
References
- https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/14ExploitThird Party Advisory
- https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/14ExploitThird Party Advisory
FAQ
What is CVE-2022-27022?
CVE-2022-27022 is a vulnerability with a CVSS score of 9.8 (CRITICAL). There is a stack overflow vulnerability in the SetSysTimeCfg() function in the httpd service of Tenda AC9 V15.03.2.21_cn. The attacker can obtain a stable root shell through a constructed payload.
How severe is CVE-2022-27022?
CVE-2022-27022 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-27022?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Ac9 Firmware, Tenda Ac9.