CVE-2022-45513: n/a in n/a
Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/P2pListFilter.
AI Analysis
Technical Summary
CVE-2022-45513 is a high-severity stack overflow vulnerability identified in the Tenda W30E router firmware version V1.0.1.25(633). The vulnerability arises from improper handling of the 'page' parameter in the HTTP request sent to the endpoint /goform/P2pListFilter. Specifically, the router's firmware fails to adequately validate or sanitize the input length or content of this parameter, leading to a stack-based buffer overflow condition (CWE-787). This type of vulnerability can allow an attacker to overwrite the call stack, potentially leading to arbitrary code execution or denial of service (DoS) conditions. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on availability, as the CVSS score notes no confidentiality or integrity impact but a high availability impact. No public exploits have been reported in the wild to date, and no official patches or vendor advisories have been published. The lack of vendor or product metadata beyond the Tenda W30E model limits detailed attribution, but the vulnerability clearly affects this specific router model and firmware version. Given the nature of the vulnerability, exploitation could disrupt network connectivity or potentially allow attackers to gain control over the device if combined with other vulnerabilities or techniques. The vulnerability was reserved in late November 2022 and published in early December 2022, indicating it is relatively recent and may not yet be widely mitigated in deployed devices.
Potential Impact
For European organizations, especially small and medium enterprises or residential users relying on Tenda W30E routers, this vulnerability poses a significant risk to network availability. Exploitation could lead to denial of service, disrupting internet access and internal network communications. In environments where these routers are used as gateways for critical business operations or remote work, such disruption could result in operational downtime and productivity loss. Although the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can indirectly affect business continuity and service delivery. Additionally, if attackers leverage this vulnerability as part of a multi-stage attack, it could serve as a foothold for further compromise, especially in poorly segmented networks. European organizations with limited IT security resources may be slower to detect or respond to such attacks, increasing potential impact. Furthermore, given the remote exploitability without authentication, attackers can scan and target vulnerable devices en masse, increasing the likelihood of widespread disruption. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge.
Mitigation Recommendations
1. Immediate mitigation should focus on isolating Tenda W30E devices from direct exposure to untrusted networks, such as the internet, by placing them behind firewalls or network address translation (NAT) devices that restrict access to the /goform/P2pListFilter endpoint. 2. Network administrators should implement strict ingress filtering and monitor for unusual HTTP requests targeting the vulnerable endpoint, using intrusion detection systems (IDS) or web application firewalls (WAF) configured with custom rules to detect anomalous 'page' parameter values. 3. Where possible, replace or upgrade affected Tenda W30E devices with models from vendors that provide timely security updates and patches. 4. If firmware updates become available from Tenda, apply them promptly. Until then, consider disabling remote management features or restricting management access to trusted internal IP addresses only. 5. Conduct network segmentation to limit the impact of any compromised router, ensuring critical systems are not directly accessible through vulnerable devices. 6. Regularly audit network devices for outdated firmware versions and maintain an asset inventory to quickly identify vulnerable hardware. 7. Educate users and IT staff about the risks of using unsupported or unpatched consumer-grade networking equipment in business environments.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland, Belgium
CVE-2022-45513: n/a in n/a
Description
Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/P2pListFilter.
AI-Powered Analysis
Technical Analysis
CVE-2022-45513 is a high-severity stack overflow vulnerability identified in the Tenda W30E router firmware version V1.0.1.25(633). The vulnerability arises from improper handling of the 'page' parameter in the HTTP request sent to the endpoint /goform/P2pListFilter. Specifically, the router's firmware fails to adequately validate or sanitize the input length or content of this parameter, leading to a stack-based buffer overflow condition (CWE-787). This type of vulnerability can allow an attacker to overwrite the call stack, potentially leading to arbitrary code execution or denial of service (DoS) conditions. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on availability, as the CVSS score notes no confidentiality or integrity impact but a high availability impact. No public exploits have been reported in the wild to date, and no official patches or vendor advisories have been published. The lack of vendor or product metadata beyond the Tenda W30E model limits detailed attribution, but the vulnerability clearly affects this specific router model and firmware version. Given the nature of the vulnerability, exploitation could disrupt network connectivity or potentially allow attackers to gain control over the device if combined with other vulnerabilities or techniques. The vulnerability was reserved in late November 2022 and published in early December 2022, indicating it is relatively recent and may not yet be widely mitigated in deployed devices.
Potential Impact
For European organizations, especially small and medium enterprises or residential users relying on Tenda W30E routers, this vulnerability poses a significant risk to network availability. Exploitation could lead to denial of service, disrupting internet access and internal network communications. In environments where these routers are used as gateways for critical business operations or remote work, such disruption could result in operational downtime and productivity loss. Although the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can indirectly affect business continuity and service delivery. Additionally, if attackers leverage this vulnerability as part of a multi-stage attack, it could serve as a foothold for further compromise, especially in poorly segmented networks. European organizations with limited IT security resources may be slower to detect or respond to such attacks, increasing potential impact. Furthermore, given the remote exploitability without authentication, attackers can scan and target vulnerable devices en masse, increasing the likelihood of widespread disruption. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge.
Mitigation Recommendations
1. Immediate mitigation should focus on isolating Tenda W30E devices from direct exposure to untrusted networks, such as the internet, by placing them behind firewalls or network address translation (NAT) devices that restrict access to the /goform/P2pListFilter endpoint. 2. Network administrators should implement strict ingress filtering and monitor for unusual HTTP requests targeting the vulnerable endpoint, using intrusion detection systems (IDS) or web application firewalls (WAF) configured with custom rules to detect anomalous 'page' parameter values. 3. Where possible, replace or upgrade affected Tenda W30E devices with models from vendors that provide timely security updates and patches. 4. If firmware updates become available from Tenda, apply them promptly. Until then, consider disabling remote management features or restricting management access to trusted internal IP addresses only. 5. Conduct network segmentation to limit the impact of any compromised router, ensuring critical systems are not directly accessible through vulnerable devices. 6. Regularly audit network devices for outdated firmware versions and maintain an asset inventory to quickly identify vulnerable hardware. 7. Educate users and IT staff about the risks of using unsupported or unpatched consumer-grade networking equipment in business environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-11-21T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9847c4522896dcbf58ff
Added to database: 5/21/2025, 9:09:27 AM
Last enriched: 6/21/2025, 7:22:03 PM
Last updated: 7/27/2025, 12:25:56 AM
Views: 9
Related Threats
CVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.