Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:tenda:w15e_firmware:15.11.0.10\\(1576\\):*:*:*:*:*:*:*", "matchCriteriaId": "03AB5835-92BD-42C1-ADA6-654161BFDFC4", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:tenda:ac1200_v-w15ev2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D3ADECB-FC43-49E5-8C52-39673CE61B7B", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "The Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router is vulnerable to improper authorization / improper session management that allows the router login page to be bypassed. This leads to authenticated attackers having the ability to read the routers syslog.log file which contains the MD5 password of the Administrator's user account."}, {"lang": "es", "value": "Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router es vulnerable a una autorizaci\u00f3n inadecuada/gesti\u00f3n de sesi\u00f3n incorrecta que permite omitir la p\u00e1gina de inicio de sesi\u00f3n del router. Esto lleva a que los atacantes autenticados tengan la capacidad de leer el archivo syslog.log del router que contiene la contrase\u00f1a MD5 de la cuenta de usuario del administrador."}], "id": "CVE-2022-40843", "lastModified": "2024-11-21T07:22:08.140", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-11-15T02:15:09.093", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Technical Description", "Third Party Advisory"], "url": "https://boschko.ca/tenda_ac1200_router/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Technical Description", "Third Party Advisory"], "url": "https://boschko.ca/tenda_ac1200_router/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}