Skip to main content

CVE-2022-45651: n/a in n/a

Critical
VulnerabilityCVE-2022-45651cvecve-2022-45651n-acwe-120
Published: Fri Dec 02 2022 (12/02/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the list parameter in the formSetVirtualSer function.

AI-Powered Analysis

AILast updated: 06/22/2025, 00:12:36 UTC

Technical Analysis

CVE-2022-45651 is a critical buffer overflow vulnerability identified in the Tenda AC6 V1.0 router firmware version 15.03.05.19. The vulnerability arises from improper handling of the 'list' parameter within the function formSetVirtualSer. Specifically, this function fails to adequately validate or limit the size of input data, leading to a classic CWE-120 buffer overflow condition. An attacker can exploit this flaw by sending a specially crafted request that triggers the overflow, potentially overwriting adjacent memory regions. Given the CVSS 3.1 base score of 9.1, the vulnerability is remotely exploitable over the network without requiring any privileges or user interaction (AV:N/AC:L/PR:N/UI:N). The impact vector indicates that exploitation can lead to a complete compromise of the device's integrity and availability, allowing an attacker to execute arbitrary code, cause a denial of service, or disrupt normal router operations. No known exploits have been reported in the wild as of the published date, and no official patches have been linked, increasing the urgency for affected users to apply mitigations. The vulnerability affects a widely deployed consumer-grade router model, which is often used in home and small office environments, making it a potential entry point for attackers targeting network infrastructure or connected devices.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and residential users relying on Tenda AC6 routers, this vulnerability poses a significant risk. Successful exploitation could allow attackers to gain control over the router, enabling interception or manipulation of network traffic, deployment of malware, or pivoting to internal networks. This could lead to data breaches, disruption of business operations, and compromise of connected IoT devices. Given the router's role as a network gateway, the integrity and availability of network services could be severely impacted. Additionally, compromised routers could be recruited into botnets, amplifying threats such as distributed denial-of-service (DDoS) attacks. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation in unpatched environments.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Tenda AC6 routers from critical network segments to limit potential lateral movement if compromised. 2. Disable remote management interfaces on the router to prevent external exploitation. 3. Monitor network traffic for unusual patterns indicative of exploitation attempts or post-compromise activity. 4. Where possible, replace affected Tenda AC6 routers with models from vendors with active security support and timely patching. 5. If replacement is not feasible, implement strict firewall rules restricting inbound and outbound traffic to and from the router. 6. Regularly audit router firmware versions across the organization and maintain an inventory to identify affected devices. 7. Engage with Tenda support channels to obtain any unofficial patches or mitigation guidance. 8. Educate users on the risks of using outdated or unsupported network devices and encourage prompt updates or replacements. 9. Employ network intrusion detection systems (NIDS) tuned to detect exploitation attempts targeting buffer overflow vulnerabilities in routers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-21T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf14b2

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/22/2025, 12:12:36 AM

Last updated: 6/29/2025, 9:26:54 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats