Skip to main content

CVE-2022-44168: n/a in n/a

High
VulnerabilityCVE-2022-44168cvecve-2022-44168
Published: Mon Nov 21 2022 (11/21/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC15 V15.03.05.18 is vulnerable to Buffer Overflow via function fromSetRouteStatic..

AI-Powered Analysis

AILast updated: 06/22/2025, 12:50:07 UTC

Technical Analysis

CVE-2022-44168 is a high-severity buffer overflow vulnerability identified in the Tenda AC15 router firmware version V15.03.05.18. The vulnerability arises from improper handling of input data within the function fromSetRouteStatic, which is responsible for managing static routing configurations. A buffer overflow occurs when the function processes input that exceeds the allocated buffer size, leading to memory corruption. This type of vulnerability is classified under CWE-787 (Out-of-bounds Write). According to the CVSS 3.1 vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), the vulnerability can be exploited remotely over the network without any authentication or user interaction, making it highly accessible to attackers. The impact is primarily on availability, as exploitation can cause denial of service (DoS) by crashing the device or causing it to reboot unexpectedly. Although confidentiality and integrity impacts are not indicated, the loss of availability in network infrastructure devices like routers can disrupt organizational connectivity and operations. No known exploits have been reported in the wild as of the published date (November 21, 2022), and no official patches or vendor advisories are currently available. The vulnerability affects a specific firmware version of the Tenda AC15 router, a consumer and small business networking device widely used for wireless connectivity and routing functions.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to significant network disruptions, especially in environments relying on Tenda AC15 routers for critical connectivity. The denial of service caused by a buffer overflow can interrupt internet access, internal communications, and access to cloud or on-premises services, impacting business continuity. Small and medium enterprises (SMEs) and home office setups using this router model are particularly vulnerable due to the lack of advanced network redundancy and security monitoring. In sectors such as finance, healthcare, and manufacturing, where continuous network availability is crucial, such disruptions could result in operational delays, financial losses, and potential regulatory non-compliance. Moreover, the ease of remote exploitation without authentication increases the risk of automated attacks or scanning by threat actors targeting exposed devices. Although no data confidentiality or integrity compromise is indicated, the availability impact alone can have cascading effects on organizational productivity and service delivery.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Immediate identification and inventory of Tenda AC15 routers running firmware version V15.03.05.18 or earlier to assess exposure. 2) Network segmentation to isolate vulnerable routers from critical infrastructure and sensitive data environments, limiting the blast radius of potential attacks. 3) Restrict remote management access to the routers by disabling WAN-side administration interfaces or limiting access via firewall rules to trusted IP addresses only. 4) Monitor network traffic for unusual patterns or repeated attempts to exploit routing configuration interfaces, using intrusion detection/prevention systems (IDS/IPS) with custom signatures targeting buffer overflow attempts. 5) Where possible, replace vulnerable Tenda AC15 devices with alternative hardware that receives timely security updates and vendor support. 6) Engage with Tenda support channels to obtain firmware updates or official guidance and apply patches promptly once available. 7) Educate IT staff about this vulnerability to ensure rapid response to any signs of exploitation or device instability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-30T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbeea46

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/22/2025, 12:50:07 PM

Last updated: 7/31/2025, 1:17:50 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats