CVE-2022-45659: n/a in n/a
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the wpapsk_crypto parameter in the fromSetWirelessRepeat function.
AI Analysis
Technical Summary
CVE-2022-45659 is a high-severity buffer overflow vulnerability identified in the Tenda AC6 V1.0 router firmware version 15.03.05.19. The flaw exists in the fromSetWirelessRepeat function, specifically triggered by the wpapsk_crypto parameter. A buffer overflow occurs when the input data exceeds the allocated buffer size, potentially allowing an attacker to overwrite adjacent memory. This vulnerability is exploitable remotely over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on availability (A:H), meaning successful exploitation could cause the device to crash or reboot, leading to denial of service (DoS). The vulnerability does not directly affect confidentiality or integrity, but a buffer overflow could theoretically be leveraged for arbitrary code execution if combined with other weaknesses, although no such exploits are currently known in the wild. The CWE-120 classification confirms this is a classic buffer overflow issue, which is a common and well-understood software weakness. The lack of a vendor or product name beyond the Tenda AC6 router limits the scope of affected devices, but the specific firmware version is clearly identified. No patches or fixes have been linked yet, indicating that users of this firmware version remain vulnerable. Given the network-exploitable nature and lack of authentication, this vulnerability poses a significant risk to affected devices, especially in environments where these routers are deployed in exposed network segments or critical infrastructure roles.
Potential Impact
For European organizations, the primary impact of CVE-2022-45659 is the potential disruption of network connectivity due to denial of service on affected Tenda AC6 routers. This could interrupt business operations, especially for small and medium enterprises (SMEs) or home office setups relying on these consumer-grade routers. While the vulnerability does not directly compromise data confidentiality or integrity, the loss of availability can hinder access to critical services, remote work capabilities, and internal communications. In sectors such as healthcare, finance, or manufacturing where network reliability is crucial, repeated or targeted exploitation could degrade operational resilience. Additionally, compromised routers could be used as pivot points or for network reconnaissance if attackers combine this vulnerability with others, though no such exploits are currently documented. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as public disclosure may prompt attackers to develop exploits. Organizations using Tenda AC6 routers should consider the risk of service disruption and potential cascading effects on dependent systems.
Mitigation Recommendations
1. Immediate mitigation involves identifying and inventorying all Tenda AC6 routers running firmware version 15.03.05.19 within the network. 2. Since no official patches are currently available, organizations should consider isolating these devices from critical network segments or the internet to reduce exposure. 3. Implement network-level protections such as firewall rules to restrict access to router management interfaces and limit incoming traffic to trusted sources. 4. Monitor network traffic and device logs for unusual activity or repeated crashes that may indicate exploitation attempts. 5. If feasible, replace vulnerable routers with models from vendors that provide timely security updates and have a strong security track record. 6. Engage with Tenda support channels to inquire about firmware updates or security advisories addressing this vulnerability. 7. For organizations with security operations centers (SOCs), develop detection signatures for anomalous packets targeting the wpapsk_crypto parameter or abnormal router behavior. 8. Educate users and administrators about the risks of using outdated firmware and the importance of timely updates and device replacement in mitigating vulnerabilities.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2022-45659: n/a in n/a
Description
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the wpapsk_crypto parameter in the fromSetWirelessRepeat function.
AI-Powered Analysis
Technical Analysis
CVE-2022-45659 is a high-severity buffer overflow vulnerability identified in the Tenda AC6 V1.0 router firmware version 15.03.05.19. The flaw exists in the fromSetWirelessRepeat function, specifically triggered by the wpapsk_crypto parameter. A buffer overflow occurs when the input data exceeds the allocated buffer size, potentially allowing an attacker to overwrite adjacent memory. This vulnerability is exploitable remotely over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on availability (A:H), meaning successful exploitation could cause the device to crash or reboot, leading to denial of service (DoS). The vulnerability does not directly affect confidentiality or integrity, but a buffer overflow could theoretically be leveraged for arbitrary code execution if combined with other weaknesses, although no such exploits are currently known in the wild. The CWE-120 classification confirms this is a classic buffer overflow issue, which is a common and well-understood software weakness. The lack of a vendor or product name beyond the Tenda AC6 router limits the scope of affected devices, but the specific firmware version is clearly identified. No patches or fixes have been linked yet, indicating that users of this firmware version remain vulnerable. Given the network-exploitable nature and lack of authentication, this vulnerability poses a significant risk to affected devices, especially in environments where these routers are deployed in exposed network segments or critical infrastructure roles.
Potential Impact
For European organizations, the primary impact of CVE-2022-45659 is the potential disruption of network connectivity due to denial of service on affected Tenda AC6 routers. This could interrupt business operations, especially for small and medium enterprises (SMEs) or home office setups relying on these consumer-grade routers. While the vulnerability does not directly compromise data confidentiality or integrity, the loss of availability can hinder access to critical services, remote work capabilities, and internal communications. In sectors such as healthcare, finance, or manufacturing where network reliability is crucial, repeated or targeted exploitation could degrade operational resilience. Additionally, compromised routers could be used as pivot points or for network reconnaissance if attackers combine this vulnerability with others, though no such exploits are currently documented. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as public disclosure may prompt attackers to develop exploits. Organizations using Tenda AC6 routers should consider the risk of service disruption and potential cascading effects on dependent systems.
Mitigation Recommendations
1. Immediate mitigation involves identifying and inventorying all Tenda AC6 routers running firmware version 15.03.05.19 within the network. 2. Since no official patches are currently available, organizations should consider isolating these devices from critical network segments or the internet to reduce exposure. 3. Implement network-level protections such as firewall rules to restrict access to router management interfaces and limit incoming traffic to trusted sources. 4. Monitor network traffic and device logs for unusual activity or repeated crashes that may indicate exploitation attempts. 5. If feasible, replace vulnerable routers with models from vendors that provide timely security updates and have a strong security track record. 6. Engage with Tenda support channels to inquire about firmware updates or security advisories addressing this vulnerability. 7. For organizations with security operations centers (SOCs), develop detection signatures for anomalous packets targeting the wpapsk_crypto parameter or abnormal router behavior. 8. Educate users and administrators about the risks of using outdated firmware and the importance of timely updates and device replacement in mitigating vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-11-21T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d983fc4522896dcbf0caa
Added to database: 5/21/2025, 9:09:19 AM
Last enriched: 6/22/2025, 3:05:31 AM
Last updated: 7/26/2025, 6:21:52 PM
Views: 10
Related Threats
CVE-2025-54956: CWE-669 Incorrect Resource Transfer Between Spheres in r-lib gh
LowCVE-2025-8513: Improper Export of Android Application Components in Caixin News App
MediumCVE-2025-8512: Improper Export of Android Application Components in TVB Big Big Shop App
MediumCVE-2025-8511: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-8510: Cross Site Scripting in Portabilis i-Educar
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.