ID

VAR-202207-0118


CVE

CVE-2022-32036


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  m3  Out-of-bounds write vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2022-012478

DESCRIPTION

Tenda M3 V1.0.0.12 was discovered to contain multiple stack overflow vulnerabilities via the ssidList, storeName, and trademark parameters in the function formSetStoreWeb. Shenzhen Tenda Technology Co.,Ltd. of m3 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. Tenda M3 is an access controller from Tenda, a Chinese company. There is a buffer overflow vulnerability in Tenda M3 V1.0.0.12. The vulnerability stems from the fact that the ssidList, storeName, trademark parameters of the formSetStoreWeb function do not check the length of the input data. An attacker could exploit this vulnerability to cause a denial of service attack

Trust: 2.25

sources: NVD: CVE-2022-32036 // JVNDB: JVNDB-2022-012478 // CNVD: CNVD-2022-52124 // VULMON: CVE-2022-32036

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-52124

AFFECTED PRODUCTS

vendor:tendamodel:m3scope:eqversion:1.0.0.12

Trust: 1.0

vendor:tendamodel:m3scope:eqversion:m3 firmware 1.0.0.12

Trust: 0.8

vendor:tendamodel:m3scope: - version: -

Trust: 0.8

vendor:tendamodel:m3scope:eqversion: -

Trust: 0.8

vendor:tendamodel:m3scope:eqversion:v1.0.0.12

Trust: 0.6

sources: CNVD: CNVD-2022-52124 // JVNDB: JVNDB-2022-012478 // NVD: CVE-2022-32036

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-32036
value: HIGH

Trust: 1.0

NVD: CVE-2022-32036
value: HIGH

Trust: 0.8

CNVD: CNVD-2022-52124
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202207-277
value: HIGH

Trust: 0.6

VULMON: CVE-2022-32036
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2022-32036
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2022-52124
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-32036
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-32036
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-52124 // VULMON: CVE-2022-32036 // JVNDB: JVNDB-2022-012478 // CNNVD: CNNVD-202207-277 // NVD: CVE-2022-32036

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-012478 // NVD: CVE-2022-32036

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202207-277

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202207-277

PATCH

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-32036

Trust: 0.1

sources: VULMON: CVE-2022-32036

EXTERNAL IDS

db:NVDid:CVE-2022-32036

Trust: 3.9

db:JVNDBid:JVNDB-2022-012478

Trust: 0.8

db:CNVDid:CNVD-2022-52124

Trust: 0.6

db:CNNVDid:CNNVD-202207-277

Trust: 0.6

db:VULMONid:CVE-2022-32036

Trust: 0.1

sources: CNVD: CNVD-2022-52124 // VULMON: CVE-2022-32036 // JVNDB: JVNDB-2022-012478 // CNNVD: CNNVD-202207-277 // NVD: CVE-2022-32036

REFERENCES

url:https://github.com/d1tto/iot-vuln/tree/main/tenda/m3/formsetstoreweb

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-32036

Trust: 1.4

url:https://cxsecurity.com/cveshow/cve-2022-32036/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2022-32036

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2022-52124 // VULMON: CVE-2022-32036 // JVNDB: JVNDB-2022-012478 // CNNVD: CNNVD-202207-277 // NVD: CVE-2022-32036

SOURCES

db:CNVDid:CNVD-2022-52124
db:VULMONid:CVE-2022-32036
db:JVNDBid:JVNDB-2022-012478
db:CNNVDid:CNNVD-202207-277
db:NVDid:CVE-2022-32036

LAST UPDATE DATE

2024-08-14T15:27:14.542000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-52124date:2022-07-18T00:00:00
db:VULMONid:CVE-2022-32036date:2023-01-20T00:00:00
db:JVNDBid:JVNDB-2022-012478date:2023-08-30T08:18:00
db:CNNVDid:CNNVD-202207-277date:2022-07-11T00:00:00
db:NVDid:CVE-2022-32036date:2023-01-20T03:00:39.143

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-52124date:2022-07-18T00:00:00
db:VULMONid:CVE-2022-32036date:2022-07-01T00:00:00
db:JVNDBid:JVNDB-2022-012478date:2023-08-30T00:00:00
db:CNNVDid:CNNVD-202207-277date:2022-07-01T00:00:00
db:NVDid:CVE-2022-32036date:2022-07-01T18:15:09.130