Skip to main content

CVE-2022-45043: n/a in n/a

High
VulnerabilityCVE-2022-45043cvecve-2022-45043n-acwe-78
Published: Mon Dec 12 2022 (12/12/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AX12 V22.03.01.16_cn is vulnerable to command injection via goform/fast_setting_internet_set.

AI-Powered Analysis

AILast updated: 06/21/2025, 16:09:22 UTC

Technical Analysis

CVE-2022-45043 is a high-severity command injection vulnerability affecting the Tenda AX12 router firmware version V22.03.01.16_cn. The vulnerability resides in the web interface endpoint goform/fast_setting_internet_set, which is used for configuring internet settings on the device. Due to insufficient input validation, an attacker with low privileges but network access can inject arbitrary operating system commands through this endpoint. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that malicious input is executed directly by the system shell. The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with an attack vector of network (remote), low attack complexity, and no user interaction required. However, the attacker must have some level of privileges (PR:L), meaning authentication or access to the device’s management interface is necessary. Exploitation could allow an attacker to execute arbitrary commands with the privileges of the web server process, potentially leading to full system compromise, data exfiltration, or disruption of network services. No public exploits or patches are currently documented, but the vulnerability is recognized by CISA, highlighting its significance. The lack of vendor or product details beyond the firmware version limits precise attribution, but the affected product is a consumer-grade router widely used in various markets, including Europe.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and residential users relying on Tenda AX12 routers, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized control over network infrastructure, enabling attackers to intercept or manipulate network traffic, deploy malware, or pivot into internal networks. This can compromise sensitive business data, disrupt internet connectivity, and degrade trust in network reliability. Given the router’s role as a gateway device, the impact extends beyond the device itself to the broader network environment. Critical sectors such as finance, healthcare, and manufacturing that depend on stable and secure internet connectivity could face operational disruptions. Additionally, the vulnerability could be leveraged in botnet campaigns or as a foothold for more sophisticated attacks targeting European networks. The requirement for low privilege access somewhat limits remote exploitation but does not eliminate risk, especially if default or weak credentials are used or if the management interface is exposed to untrusted networks.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the router’s management interface to trusted networks only, preferably via VLAN segmentation or firewall rules blocking external access. 2. Change default or weak administrative credentials to strong, unique passwords to prevent unauthorized login. 3. Monitor network traffic for unusual activity originating from the router, such as unexpected outbound connections or command execution patterns. 4. Disable remote management features if not required, reducing the attack surface. 5. Regularly check for firmware updates from Tenda or official sources and apply patches promptly once available. 6. Employ network intrusion detection systems (NIDS) capable of detecting command injection attempts or anomalous HTTP requests targeting the vulnerable endpoint. 7. For organizations with large deployments, consider network segmentation and device inventory audits to identify and isolate vulnerable devices. 8. Educate users on the risks of exposing router management interfaces and enforce policies to prevent insecure configurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-07T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9848c4522896dcbf5fc7

Added to database: 5/21/2025, 9:09:28 AM

Last enriched: 6/21/2025, 4:09:22 PM

Last updated: 7/29/2025, 11:33:52 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats