CVE-2022-26243

7.5 HIGH

📋 TL;DR

CVE-2022-26243 is a buffer overflow vulnerability in Tenda AC10-1200 routers that allows attackers to execute arbitrary code or cause denial of service. The vulnerability affects users of Tenda AC10-1200 routers running vulnerable firmware versions. Attackers can exploit this remotely without authentication.

💻 Affected Systems

Products:
  • Tenda AC10-1200
Versions: v15.03.06.23_EN (specific version mentioned in CVE)
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects this specific model and firmware version. Other Tenda models or different firmware versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete router compromise, network traffic interception, credential theft, and lateral movement into connected devices.

🟠

Likely Case

Router crash causing denial of service, requiring physical reset and disrupting network connectivity for all connected devices.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access, though internal network attacks remain possible.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and the exploit requires no authentication.
🏢 Internal Only: HIGH - Even if not internet-facing, any attacker on the local network can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Detailed exploit analysis and proof-of-concept available in public references. The vulnerability is in the setSmartPowerManagement function via sscanf buffer overflow.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tenda website for firmware updates beyond v15.03.06.23_EN

Vendor Advisory: Not specified in provided references

Restart Required: Yes

Instructions:

1. Visit Tenda support website. 2. Download latest firmware for AC10-1200. 3. Log into router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router administration interface

Network segmentation

all

Isolate router management interface to separate VLAN

🧯 If You Can't Patch

  • Replace router with different model that doesn't have this vulnerability
  • Place router behind dedicated firewall with strict inbound rules blocking all unnecessary ports

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or System Tools

Check Version:

Login to router web interface and check System Status page

Verify Fix Applied:

Verify firmware version is updated to version newer than v15.03.06.23_EN

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/setSmartPowerManagement
  • Router crash/reboot logs
  • Multiple failed exploit attempts

Network Indicators:

  • Unusual traffic to router management port (typically 80/443)
  • Exploit pattern in HTTP requests

SIEM Query:

http.method=POST AND http.uri="/goform/setSmartPowerManagement" AND (http.user_agent contains unusual OR http.content_length > threshold)

🔗 References

📤 Share & Export