Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-44177: n/a in n/a

0
Critical
VulnerabilityCVE-2022-44177cvecve-2022-44177
Published: Mon Nov 21 2022 (11/21/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formWifiWpsStart.

AI-Powered Analysis

AILast updated: 06/22/2025, 10:07:11 UTC

Technical Analysis

CVE-2022-44177 is a critical buffer overflow vulnerability identified in the Tenda AC18 router firmware version V15.03.05.19. The vulnerability exists in the function formWifiWpsStart, which is involved in initiating the Wi-Fi Protected Setup (WPS) process. Buffer overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory. This can lead to arbitrary code execution, system crashes, or other unpredictable behavior. In this case, the vulnerability allows an unauthenticated remote attacker to execute arbitrary code on the device without any user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability affects the confidentiality, integrity, and availability of the device, with a CVSS v3.1 base score of 9.8, categorizing it as critical. The exploitability is high due to the network attack vector and low attack complexity, and no privileges or user interaction are required. Although no known exploits are currently reported in the wild, the severity and nature of the vulnerability make it a significant risk. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), which is a well-known and frequently exploited weakness in software. The lack of vendor or product details beyond the Tenda AC18 router limits the scope of affected products, but the specific firmware version is clearly identified. No official patches or mitigation links have been provided as of the publication date (November 21, 2022).

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on Tenda AC18 routers in their network infrastructure. Successful exploitation could lead to complete compromise of the affected router, allowing attackers to intercept, modify, or disrupt network traffic. This jeopardizes the confidentiality of sensitive communications, the integrity of data passing through the device, and the availability of network services. Given that routers are critical network gateways, an attacker could pivot from the compromised device to internal networks, potentially accessing sensitive systems or data. This risk is heightened in environments with limited network segmentation or where routers are directly exposed to untrusted networks. The vulnerability's ease of exploitation and lack of authentication requirements make it attractive for attackers aiming to establish persistent footholds or conduct espionage, sabotage, or data exfiltration. Additionally, the WPS function is often enabled by default, increasing the attack surface. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation, as proof-of-concept exploits could emerge rapidly. European organizations in sectors such as telecommunications, critical infrastructure, government, and enterprises with distributed networks are particularly at risk due to their reliance on robust and secure network devices.

Mitigation Recommendations

1. Immediate mitigation should focus on isolating affected Tenda AC18 routers from untrusted networks, especially the internet, to reduce exposure. 2. Disable the WPS feature on the router if possible, as the vulnerability resides in the formWifiWpsStart function related to WPS initiation. 3. Monitor network traffic for unusual activity originating from or targeting the router, including unexpected connections or data flows. 4. Implement network segmentation to limit lateral movement in case of device compromise. 5. Regularly check for firmware updates or security advisories from Tenda, and apply patches promptly once available. 6. If replacement is feasible, consider migrating to network devices from vendors with active security support and transparent patching processes. 7. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous behavior or known exploit patterns targeting buffer overflow vulnerabilities in routers. 8. Conduct internal audits to inventory all Tenda AC18 devices and verify firmware versions to identify vulnerable units. 9. Educate network administrators about the risks associated with WPS and buffer overflow vulnerabilities to ensure vigilant device management. These steps go beyond generic advice by focusing on specific router features, network architecture adjustments, and proactive monitoring tailored to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-30T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbeef35

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/22/2025, 10:07:11 AM

Last updated: 2/7/2026, 3:32:14 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats