ID

VAR-202308-3430


CVE

CVE-2023-40797


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  ac23  Firmware Input Validation Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2023-022854

DESCRIPTION

In Tenda AC23 v16.03.07.45_cn, the sub_4781A4 function does not validate the parameters entered by the user, resulting in a post-authentication stack overflow vulnerability. Shenzhen Tenda Technology Co.,Ltd. of ac23 There is an input validation vulnerability in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda AC23 is a dual-band wireless router for home use launched by Tenda, designed for large homes with high-speed transmission. It supports 802.11ac Wave2 technology and boasts a maximum concurrent dual-band speed of 2033Mbps. Attackers could exploit this vulnerability to execute arbitrary code or cause a denial-of-service attack

Trust: 2.25

sources: NVD: CVE-2023-40797 // JVNDB: JVNDB-2023-022854 // CNVD: CNVD-2025-27896 // VULMON: CVE-2023-40797

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-27896

AFFECTED PRODUCTS

vendor:tendamodel:ac23scope:eqversion:16.03.07.45_cn

Trust: 1.0

vendor:tendamodel:ac23scope:eqversion: -

Trust: 0.8

vendor:tendamodel:ac23scope:eqversion:ac23 firmware 16.03.07.45 cn

Trust: 0.8

vendor:tendamodel:ac23scope: - version: -

Trust: 0.8

vendor:tendamodel:ac23 16.03.07.45 cnscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-27896 // JVNDB: JVNDB-2023-022854 // NVD: CVE-2023-40797

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-40797
value: HIGH

Trust: 1.0

NVD: CVE-2023-40797
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-27896
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-27896
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-40797
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2023-40797
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-27896 // JVNDB: JVNDB-2023-022854 // NVD: CVE-2023-40797

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-022854 // NVD: CVE-2023-40797

EXTERNAL IDS

db:NVDid:CVE-2023-40797

Trust: 3.3

db:JVNDBid:JVNDB-2023-022854

Trust: 0.8

db:CNVDid:CNVD-2025-27896

Trust: 0.6

db:VULMONid:CVE-2023-40797

Trust: 0.1

sources: CNVD: CNVD-2025-27896 // VULMON: CVE-2023-40797 // JVNDB: JVNDB-2023-022854 // NVD: CVE-2023-40797

REFERENCES

url:https://github.com/lst-oss/vulnerability/tree/main/tenda/ac23/sub_4781a4

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2023-40797

Trust: 0.8

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2025-27896 // VULMON: CVE-2023-40797 // JVNDB: JVNDB-2023-022854 // NVD: CVE-2023-40797

SOURCES

db:CNVDid:CNVD-2025-27896
db:VULMONid:CVE-2023-40797
db:JVNDBid:JVNDB-2023-022854
db:NVDid:CVE-2023-40797

LAST UPDATE DATE

2025-11-19T23:12:06.707000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-27896date:2025-11-14T00:00:00
db:VULMONid:CVE-2023-40797date:2023-08-25T00:00:00
db:JVNDBid:JVNDB-2023-022854date:2024-01-24T06:57:00
db:NVDid:CVE-2023-40797date:2023-08-29T16:11:05.843

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-27896date:2025-11-14T00:00:00
db:VULMONid:CVE-2023-40797date:2023-08-25T00:00:00
db:JVNDBid:JVNDB-2023-022854date:2024-01-24T00:00:00
db:NVDid:CVE-2023-40797date:2023-08-25T16:15:08.427