.. / CVE-2022-40843

Exploit for Tenda AC1200 V-W15Ev2 - Authentication Bypass (CVE-2022-40843)

Description:

The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router’s login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router’s file, which contains the MD5 password of the Administrator’s user account. This vulnerability exists within the local web and hosted remote management console.

Nuclei Template

View the template here CVE-2022-40843.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-40843.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2022-40843
https://boschko.ca/tenda_ac1200_router
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40843