Skip to main content

CVE-2022-44254: n/a in n/a

High
VulnerabilityCVE-2022-44254cvecve-2022-44254n-acwe-787
Published: Wed Nov 23 2022 (11/23/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter text in the setSmsCfg function.

AI-Powered Analysis

AILast updated: 06/22/2025, 06:06:53 UTC

Technical Analysis

CVE-2022-44254 is a high-severity vulnerability identified in the TOTOLINK LR350 router firmware version 9.3.5u.6369_B20220309. The vulnerability is a post-authentication buffer overflow occurring in the setSmsCfg function, specifically triggered via the 'text' parameter. Buffer overflow vulnerabilities arise when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory. In this case, the vulnerability requires an attacker to have authenticated access to the device, which means the attacker must already have valid credentials or access to the device's management interface. Once exploited, this vulnerability can lead to arbitrary code execution, allowing an attacker to compromise the confidentiality, integrity, and availability of the affected device. The CVSS v3.1 base score is 8.8, indicating a high severity with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack can be performed remotely over the network with low attack complexity, requires low privileges (authenticated user), no user interaction, and impacts confidentiality, integrity, and availability to a high degree. TOTOLINK LR350 is a consumer and small office/home office (SOHO) router, which is used to provide network connectivity. Exploiting this vulnerability could allow attackers to execute arbitrary code on the router, potentially leading to network compromise, interception or manipulation of traffic, or pivoting to internal networks. There are no known public exploits in the wild as of the published date, and no official patches or vendor advisories were provided in the information. The vulnerability is classified under CWE-787 (Out-of-bounds Write), a common and dangerous class of memory corruption bugs. Given the post-authentication requirement, attackers would need to bypass or obtain credentials, but once inside, the impact is severe.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on TOTOLINK LR350 routers, this vulnerability poses a significant risk. Exploitation could lead to full compromise of the router, enabling attackers to intercept sensitive communications, inject malicious traffic, or establish persistent footholds within corporate or home networks. This could result in data breaches, disruption of business operations, and potential lateral movement to other critical systems. The high impact on confidentiality, integrity, and availability means that sensitive data could be exposed or altered, and network services could be disrupted. Given the increasing reliance on remote work and home office setups in Europe, the risk surface is expanded. Additionally, compromised routers could be used as part of botnets or for launching further attacks, impacting broader network security. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure. The absence of vendor patches increases the urgency for mitigation.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the router's management interface to trusted networks and users only, using network segmentation and firewall rules to limit exposure. 2. Change default and weak credentials to strong, unique passwords to reduce the risk of unauthorized authentication. 3. Disable SMS configuration features if not required, or restrict access to the setSmsCfg function if possible. 4. Monitor router logs and network traffic for unusual activity that might indicate exploitation attempts. 5. Where possible, replace affected TOTOLINK LR350 devices with models from vendors providing timely security updates and patches. 6. Implement network-level intrusion detection/prevention systems (IDS/IPS) to detect anomalous behavior indicative of exploitation. 7. Regularly check for firmware updates from TOTOLINK or community sources, and apply patches promptly once available. 8. Educate users about the risks of credential compromise and enforce multi-factor authentication if supported by the device or network environment. 9. For organizations, conduct periodic vulnerability assessments and penetration testing focusing on network infrastructure devices to identify and remediate similar risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-30T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbefd13

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/22/2025, 6:06:53 AM

Last updated: 7/31/2025, 3:24:19 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats