Skip to main content

CVE-2022-45513: n/a in n/a

High
VulnerabilityCVE-2022-45513cvecve-2022-45513n-acwe-787
Published: Thu Dec 08 2022 (12/08/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/P2pListFilter.

AI-Powered Analysis

AILast updated: 06/21/2025, 19:22:03 UTC

Technical Analysis

CVE-2022-45513 is a high-severity stack overflow vulnerability identified in the Tenda W30E router firmware version V1.0.1.25(633). The vulnerability arises from improper handling of the 'page' parameter in the HTTP request sent to the endpoint /goform/P2pListFilter. Specifically, the router's firmware fails to adequately validate or sanitize the input length or content of this parameter, leading to a stack-based buffer overflow condition (CWE-787). This type of vulnerability can allow an attacker to overwrite the call stack, potentially leading to arbitrary code execution or denial of service (DoS) conditions. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on availability, as the CVSS score notes no confidentiality or integrity impact but a high availability impact. No public exploits have been reported in the wild to date, and no official patches or vendor advisories have been published. The lack of vendor or product metadata beyond the Tenda W30E model limits detailed attribution, but the vulnerability clearly affects this specific router model and firmware version. Given the nature of the vulnerability, exploitation could disrupt network connectivity or potentially allow attackers to gain control over the device if combined with other vulnerabilities or techniques. The vulnerability was reserved in late November 2022 and published in early December 2022, indicating it is relatively recent and may not yet be widely mitigated in deployed devices.

Potential Impact

For European organizations, especially small and medium enterprises or residential users relying on Tenda W30E routers, this vulnerability poses a significant risk to network availability. Exploitation could lead to denial of service, disrupting internet access and internal network communications. In environments where these routers are used as gateways for critical business operations or remote work, such disruption could result in operational downtime and productivity loss. Although the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can indirectly affect business continuity and service delivery. Additionally, if attackers leverage this vulnerability as part of a multi-stage attack, it could serve as a foothold for further compromise, especially in poorly segmented networks. European organizations with limited IT security resources may be slower to detect or respond to such attacks, increasing potential impact. Furthermore, given the remote exploitability without authentication, attackers can scan and target vulnerable devices en masse, increasing the likelihood of widespread disruption. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge.

Mitigation Recommendations

1. Immediate mitigation should focus on isolating Tenda W30E devices from direct exposure to untrusted networks, such as the internet, by placing them behind firewalls or network address translation (NAT) devices that restrict access to the /goform/P2pListFilter endpoint. 2. Network administrators should implement strict ingress filtering and monitor for unusual HTTP requests targeting the vulnerable endpoint, using intrusion detection systems (IDS) or web application firewalls (WAF) configured with custom rules to detect anomalous 'page' parameter values. 3. Where possible, replace or upgrade affected Tenda W30E devices with models from vendors that provide timely security updates and patches. 4. If firmware updates become available from Tenda, apply them promptly. Until then, consider disabling remote management features or restricting management access to trusted internal IP addresses only. 5. Conduct network segmentation to limit the impact of any compromised router, ensuring critical systems are not directly accessible through vulnerable devices. 6. Regularly audit network devices for outdated firmware versions and maintain an asset inventory to quickly identify vulnerable hardware. 7. Educate users and IT staff about the risks of using unsupported or unpatched consumer-grade networking equipment in business environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-21T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9847c4522896dcbf58ff

Added to database: 5/21/2025, 9:09:27 AM

Last enriched: 6/21/2025, 7:22:03 PM

Last updated: 7/27/2025, 12:25:56 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats