Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-45660: n/a in n/a

0
High
VulnerabilityCVE-2022-45660cvecve-2022-45660n-acwe-120
Published: Fri Dec 02 2022 (12/02/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the schedStartTime parameter in the setSchedWifi function.

AI-Powered Analysis

AILast updated: 06/22/2025, 02:21:07 UTC

Technical Analysis

CVE-2022-45660 is a high-severity buffer overflow vulnerability identified in the Tenda AC6V1.0 router firmware version 15.03.05.19. The flaw exists in the setSchedWifi function, specifically triggered via the schedStartTime parameter. Buffer overflow vulnerabilities (classified under CWE-120) occur when input data exceeds the allocated buffer size, potentially allowing an attacker to overwrite adjacent memory. In this case, the schedStartTime parameter is not properly validated or sanitized, enabling an attacker to supply crafted input that overflows the buffer. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on availability (A:H), meaning exploitation could cause denial of service conditions such as router crashes or reboots. Although the CVSS score is 7.5 (high), there is no indication that confidentiality or integrity are directly affected. No known exploits are currently reported in the wild, and no official patches or vendor advisories have been published yet. The vulnerability affects a specific Tenda router model and firmware version, which is commonly used in home and small office environments. Given the network exposure and ease of exploitation, attackers could leverage this flaw to disrupt network connectivity or potentially use it as a foothold for further attacks if combined with other vulnerabilities.

Potential Impact

For European organizations, the primary impact of CVE-2022-45660 lies in potential denial of service against network infrastructure relying on the Tenda AC6V1.0 routers. Disruption of Wi-Fi scheduling functionality could lead to intermittent or complete loss of wireless connectivity, affecting business operations, remote work, and IoT device communications. Small and medium enterprises (SMEs) and home offices using this router model may experience outages impacting productivity. While the vulnerability does not directly compromise data confidentiality or integrity, availability loss can indirectly affect operational continuity and service delivery. Additionally, if attackers gain persistent access through this or chained vulnerabilities, it could escalate to broader network compromise. The lack of patches increases the risk window, especially in environments where firmware updates are infrequent or unmanaged. Organizations with limited IT security resources may be more vulnerable to exploitation. Overall, the threat is significant for entities relying on this specific router model, particularly where network uptime is critical.

Mitigation Recommendations

Identify and inventory all Tenda AC6V1.0 routers running firmware version 15.03.05.19 within the organization’s network. Restrict remote network access to management interfaces of affected routers by implementing network segmentation and firewall rules limiting access to trusted IP addresses only. Disable or restrict the use of Wi-Fi scheduling features if not essential, to reduce the attack surface related to the vulnerable function. Monitor network traffic and device logs for unusual activity or repeated malformed requests targeting the schedStartTime parameter or related endpoints. Engage with Tenda support channels to request firmware updates or security advisories addressing this vulnerability; apply patches promptly once available. Implement compensating controls such as deploying additional network redundancy or failover mechanisms to mitigate potential denial of service impacts. Educate IT staff and users about the risks of using outdated router firmware and the importance of timely updates and secure configuration. Consider replacing affected devices with models from vendors with stronger security track records and active vulnerability management if patches are not forthcoming.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-21T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf0e81

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/22/2025, 2:21:07 AM

Last updated: 2/7/2026, 2:40:02 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats