Vulnerability Description
Tenda W20E router V15.11.0.6 contains a stack overflow in the function formSetPortMapping with post request 'goform/setPortMapping/'. This vulnerability allows attackers to cause a Denial of Service (DoS) or Remote Code Execution (RCE) via the portMappingServer, portMappingProtocol, portMappingWan, porMappingtInternal, and portMappingExternal parameters.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | W20E Firmware | 15.11.0.6 |
| Tenda | W20E | - |
Related Weaknesses (CWE)
References
- https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formSetPortMapping.mdExploitThird Party Advisory
- https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formSetPortMapping.mdExploitThird Party Advisory
FAQ
What is CVE-2022-40855?
CVE-2022-40855 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Tenda W20E router V15.11.0.6 contains a stack overflow in the function formSetPortMapping with post request 'goform/setPortMapping/'. This vulnerability allows attackers to cause a Denial of Service (...
How severe is CVE-2022-40855?
CVE-2022-40855 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-40855?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda W20E Firmware, Tenda W20E.