CVE-2022-45646: n/a in n/a
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the limitSpeedUp parameter in the formSetClientState function.
AI Analysis
Technical Summary
CVE-2022-45646 is a high-severity buffer overflow vulnerability identified in the Tenda AC6V1.0 router firmware version 15.03.05.19. The flaw exists in the formSetClientState function, specifically triggered by the limitSpeedUp parameter. Buffer overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory. In this case, the vulnerability can be exploited remotely over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts availability (A:H) but does not affect confidentiality or integrity directly. Exploiting this flaw could cause the device to crash or reboot, resulting in denial of service (DoS). Although no known exploits are currently reported in the wild, the ease of exploitation and network accessibility make it a significant risk. The vulnerability is categorized under CWE-120, which refers to classic buffer overflow issues that can lead to memory corruption. No patches or vendor advisories are currently linked, which may delay remediation efforts. Given the nature of the device—a consumer-grade router—this vulnerability could be leveraged to disrupt network connectivity for affected users or potentially serve as a foothold for further attacks if combined with other vulnerabilities or misconfigurations.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns network availability and operational continuity. Tenda AC6 routers are commonly used in small office/home office (SOHO) environments and some small enterprises due to their affordability and ease of deployment. A successful exploitation could cause routers to crash or reboot, leading to temporary loss of internet connectivity and disruption of business operations reliant on these devices. While the vulnerability does not directly compromise data confidentiality or integrity, the resulting denial of service could affect remote work capabilities, VoIP communications, and access to cloud services. In critical infrastructure or sensitive environments where network uptime is essential, such disruptions could have cascading effects. Additionally, if attackers use this vulnerability as part of a multi-stage attack, it could facilitate lateral movement or network reconnaissance. The lack of authentication requirement and user interaction increases the risk, especially in environments where these routers are exposed to the internet or untrusted networks.
Mitigation Recommendations
Immediately identify and inventory all Tenda AC6 routers, specifically version 15.03.05.19, within the organization's network environment. Restrict remote management access to these routers by disabling WAN-side administration or limiting access via firewall rules to trusted IP addresses only. Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data systems. Monitor network traffic for unusual patterns or repeated requests targeting the limitSpeedUp parameter or the formSetClientState function, which could indicate exploitation attempts. If possible, replace affected Tenda AC6 routers with models from vendors with active security support and timely patch releases. Engage with Tenda support channels to request firmware updates or patches addressing this vulnerability; if none are available, consider deploying compensating controls such as intrusion prevention systems (IPS) with custom signatures. Educate IT staff on this specific vulnerability to ensure rapid response to any signs of exploitation or device instability. Regularly back up router configurations and maintain an incident response plan that includes network device failures due to exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2022-45646: n/a in n/a
Description
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the limitSpeedUp parameter in the formSetClientState function.
AI-Powered Analysis
Technical Analysis
CVE-2022-45646 is a high-severity buffer overflow vulnerability identified in the Tenda AC6V1.0 router firmware version 15.03.05.19. The flaw exists in the formSetClientState function, specifically triggered by the limitSpeedUp parameter. Buffer overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory. In this case, the vulnerability can be exploited remotely over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts availability (A:H) but does not affect confidentiality or integrity directly. Exploiting this flaw could cause the device to crash or reboot, resulting in denial of service (DoS). Although no known exploits are currently reported in the wild, the ease of exploitation and network accessibility make it a significant risk. The vulnerability is categorized under CWE-120, which refers to classic buffer overflow issues that can lead to memory corruption. No patches or vendor advisories are currently linked, which may delay remediation efforts. Given the nature of the device—a consumer-grade router—this vulnerability could be leveraged to disrupt network connectivity for affected users or potentially serve as a foothold for further attacks if combined with other vulnerabilities or misconfigurations.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns network availability and operational continuity. Tenda AC6 routers are commonly used in small office/home office (SOHO) environments and some small enterprises due to their affordability and ease of deployment. A successful exploitation could cause routers to crash or reboot, leading to temporary loss of internet connectivity and disruption of business operations reliant on these devices. While the vulnerability does not directly compromise data confidentiality or integrity, the resulting denial of service could affect remote work capabilities, VoIP communications, and access to cloud services. In critical infrastructure or sensitive environments where network uptime is essential, such disruptions could have cascading effects. Additionally, if attackers use this vulnerability as part of a multi-stage attack, it could facilitate lateral movement or network reconnaissance. The lack of authentication requirement and user interaction increases the risk, especially in environments where these routers are exposed to the internet or untrusted networks.
Mitigation Recommendations
Immediately identify and inventory all Tenda AC6 routers, specifically version 15.03.05.19, within the organization's network environment. Restrict remote management access to these routers by disabling WAN-side administration or limiting access via firewall rules to trusted IP addresses only. Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data systems. Monitor network traffic for unusual patterns or repeated requests targeting the limitSpeedUp parameter or the formSetClientState function, which could indicate exploitation attempts. If possible, replace affected Tenda AC6 routers with models from vendors with active security support and timely patch releases. Engage with Tenda support channels to request firmware updates or patches addressing this vulnerability; if none are available, consider deploying compensating controls such as intrusion prevention systems (IPS) with custom signatures. Educate IT staff on this specific vulnerability to ensure rapid response to any signs of exploitation or device instability. Regularly back up router configurations and maintain an incident response plan that includes network device failures due to exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-11-21T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf147b
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 6/22/2025, 12:21:41 AM
Last updated: 7/31/2025, 7:10:02 AM
Views: 11
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.