Skip to main content

CVE-2022-45514: n/a in n/a

High
VulnerabilityCVE-2022-45514cvecve-2022-45514n-acwe-787
Published: Thu Dec 08 2022 (12/08/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/webExcptypemanFilter.

AI-Powered Analysis

AILast updated: 06/21/2025, 19:21:49 UTC

Technical Analysis

CVE-2022-45514 is a high-severity vulnerability identified in the Tenda W30E router firmware version V1.0.1.25(633). The vulnerability is a stack-based buffer overflow triggered via the 'page' parameter in the HTTP request to the endpoint /goform/webExcptypemanFilter. A stack overflow occurs when more data is written to a buffer located on the stack than it can hold, which can overwrite adjacent memory and potentially allow an attacker to execute arbitrary code or cause a denial of service. This specific vulnerability does not require authentication or user interaction, and it can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The CVSS 3.1 base score is 7.5, indicating a high severity level, primarily due to the impact on availability (A:H) while confidentiality and integrity are not affected (C:N/I:N). The vulnerability is classified under CWE-787 (Out-of-bounds Write). No patches or vendor advisories are currently available, and no known exploits have been reported in the wild. The lack of authentication and user interaction requirements combined with network accessibility makes this vulnerability a significant risk for affected devices, potentially allowing attackers to crash the device or disrupt network connectivity by exploiting the stack overflow condition.

Potential Impact

For European organizations using Tenda W30E routers, this vulnerability poses a substantial risk to network availability. Exploitation could lead to denial of service conditions, disrupting critical business operations, especially in environments relying on these routers for internet connectivity or internal network segmentation. Although confidentiality and integrity are not directly impacted, the loss of availability can affect service continuity, potentially leading to operational downtime and associated financial losses. Given that Tenda routers are often used in small to medium enterprises and home office environments, the impact may be more pronounced in sectors with limited IT support or where these devices serve as primary network gateways. Additionally, disruption in connectivity could affect remote work capabilities, which remain critical in many European countries. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as the vulnerability is publicly disclosed and could be targeted by opportunistic attackers or incorporated into automated scanning and exploitation tools.

Mitigation Recommendations

Organizations should first identify any Tenda W30E routers running firmware version V1.0.1.25(633) within their networks. Since no official patches are currently available, mitigation should focus on network-level controls: 1) Restrict access to the router's management interface by implementing firewall rules that limit HTTP access to trusted IP addresses only. 2) Disable remote management features if enabled to prevent exploitation from outside the local network. 3) Monitor network traffic for unusual HTTP requests targeting /goform/webExcptypemanFilter or anomalous patterns indicative of exploitation attempts. 4) Consider segmenting the network to isolate vulnerable devices from critical infrastructure. 5) Engage with the vendor or authorized support channels to obtain firmware updates or advisories. 6) Plan for device replacement or firmware upgrade as a longer-term solution once patches become available. 7) Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect attempts to exploit this specific endpoint. These steps go beyond generic advice by focusing on access restriction, monitoring, and network segmentation tailored to the nature of the vulnerability and the device involved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-21T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9847c4522896dcbf5903

Added to database: 5/21/2025, 9:09:27 AM

Last enriched: 6/21/2025, 7:21:49 PM

Last updated: 8/3/2025, 6:28:29 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats