Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-45640: n/a in n/a

0
High
VulnerabilityCVE-2022-45640cvecve-2022-45640n-acwe-787
Published: Thu Dec 01 2022 (12/01/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda Tenda AC6V1.0 V15.03.05.19 is affected by buffer overflow. Causes a denial of service (local).

AI-Powered Analysis

AILast updated: 06/22/2025, 04:07:39 UTC

Technical Analysis

CVE-2022-45640 is a high-severity vulnerability identified in the Tenda AC6 V1.0 router firmware version 15.03.05.19. The vulnerability is classified as a buffer overflow (CWE-787), which occurs when the software writes more data to a buffer than it can hold, potentially overwriting adjacent memory. This specific buffer overflow leads to a denial of service (DoS) condition that can be triggered locally, causing the device to crash or become unresponsive. According to the CVSS v3.1 vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), the attack can be performed remotely over the network without any privileges or user interaction, making exploitation relatively straightforward. The vulnerability impacts the availability of the device but does not affect confidentiality or integrity. There are no known public exploits in the wild, and no patches or vendor advisories have been linked to this vulnerability yet. The lack of detailed product information beyond the Tenda AC6 V1.0 router model limits the scope of affected devices, but given the nature of consumer-grade routers, this vulnerability could be leveraged to disrupt network connectivity for affected users or organizations.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of network services due to denial of service on Tenda AC6 routers. This could affect small and medium-sized enterprises (SMEs) or home office environments that rely on this router model for internet connectivity. The loss of availability could interrupt business operations, remote work, and access to cloud services. While the vulnerability does not compromise data confidentiality or integrity, the resulting network downtime could lead to productivity losses and potential secondary impacts such as failure of security monitoring or remote access systems. Organizations with limited IT support or those using these routers in critical infrastructure segments may face increased risk. Additionally, the ease of remote exploitation without authentication or user interaction raises concerns about automated attacks targeting vulnerable devices to cause widespread outages or to be used as part of larger denial-of-service campaigns.

Mitigation Recommendations

Given the absence of an official patch, organizations should implement the following specific mitigations: 1) Identify and inventory all Tenda AC6 V1.0 routers running firmware version 15.03.05.19 within the network. 2) Restrict remote management access to these devices by disabling WAN-side administration interfaces or limiting access via firewall rules to trusted IP addresses only. 3) Segment networks to isolate vulnerable routers from critical systems and sensitive data to reduce potential impact. 4) Monitor network traffic for unusual patterns that may indicate exploitation attempts, such as repeated connection attempts or device crashes. 5) Where possible, replace affected routers with models from vendors that provide timely security updates and have a strong security track record. 6) Engage with Tenda support channels to request firmware updates or advisories and subscribe to vulnerability notification services for future patches. 7) Implement network-level protections such as intrusion prevention systems (IPS) that can detect and block exploit attempts targeting buffer overflow vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-21T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983fc4522896dcbf08e5

Added to database: 5/21/2025, 9:09:19 AM

Last enriched: 6/22/2025, 4:07:39 AM

Last updated: 2/7/2026, 1:56:12 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats