Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-44174: n/a in n/a

0
Critical
VulnerabilityCVE-2022-44174cvecve-2022-44174
Published: Mon Nov 21 2022 (11/21/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC18 V15.03.05.05 is vulnerable to Buffer Overflow via function formSetDeviceName.

AI-Powered Analysis

AILast updated: 06/22/2025, 10:21:39 UTC

Technical Analysis

CVE-2022-44174 is a critical buffer overflow vulnerability identified in the Tenda AC18 router firmware version V15.03.05.05. The vulnerability arises from improper handling of input in the function formSetDeviceName, which is responsible for setting the device's network name. Buffer overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory and leading to arbitrary code execution or system crashes. In this case, the vulnerability allows an unauthenticated remote attacker to send specially crafted requests over the network to the affected device, triggering the overflow without requiring user interaction or prior authentication. The CVSS 3.1 base score of 9.8 reflects the high severity, with metrics indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The CWE classification CWE-120 confirms this as a classic buffer overflow issue. Although no known exploits have been reported in the wild, the vulnerability's characteristics make it a prime candidate for exploitation, especially given the critical impact and ease of attack. No official patches or vendor advisories are currently linked, which increases the urgency for mitigation through alternative means or vendor engagement. The vulnerability affects the Tenda AC18 router, a consumer and small office networking device, which is widely used in various regions including Europe. Exploitation could allow attackers to fully compromise the device, leading to network disruption, interception or manipulation of traffic, and pivoting into internal networks for further attacks.

Potential Impact

For European organizations, the impact of CVE-2022-44174 is significant due to the widespread use of Tenda AC18 routers in homes, small businesses, and potentially branch offices. Successful exploitation can lead to complete compromise of the router, resulting in loss of confidentiality through interception of sensitive communications, integrity breaches via manipulation of network traffic or device configurations, and availability disruptions through device crashes or denial of service. This can facilitate further attacks such as man-in-the-middle, lateral movement within corporate networks, or persistent footholds for espionage or sabotage. Critical infrastructure sectors and enterprises relying on these routers for network connectivity may face operational disruptions and data breaches. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the risk of automated mass exploitation campaigns. Given the router’s role as a network gateway, the vulnerability could serve as an entry point for attackers targeting European organizations, especially those with limited network segmentation or outdated device inventories.

Mitigation Recommendations

1. Immediate Network Segmentation: Isolate Tenda AC18 routers from critical network segments to limit potential lateral movement if compromised. 2. Vendor Engagement: Contact Tenda support to inquire about firmware updates or patches addressing this vulnerability and apply them promptly once available. 3. Access Restrictions: Implement firewall rules to restrict inbound access to router management interfaces from untrusted networks, ideally limiting to trusted IP addresses only. 4. Network Monitoring: Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tuned to identify attempts to exploit buffer overflow patterns targeting formSetDeviceName or similar router functions. 5. Device Inventory and Replacement: Conduct thorough asset inventories to identify all Tenda AC18 devices and consider replacing them with more secure alternatives if patching is not feasible. 6. Disable Remote Management: If remote management features are enabled on these routers, disable them to reduce exposure. 7. User Awareness: Educate users and administrators about the risks of using vulnerable routers and encourage prompt reporting of unusual network behavior. 8. Regular Firmware Audits: Establish a process for continuous monitoring of firmware versions and vulnerability disclosures for all network devices to ensure timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-30T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbeef0b

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/22/2025, 10:21:39 AM

Last updated: 2/3/2026, 9:58:35 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats