CVE-2022-45660: n/a in n/a
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the schedStartTime parameter in the setSchedWifi function.
AI Analysis
Technical Summary
CVE-2022-45660 is a high-severity buffer overflow vulnerability identified in the Tenda AC6V1.0 router firmware version 15.03.05.19. The flaw exists in the setSchedWifi function, specifically triggered via the schedStartTime parameter. Buffer overflow vulnerabilities (classified under CWE-120) occur when input data exceeds the allocated buffer size, potentially allowing an attacker to overwrite adjacent memory. In this case, the schedStartTime parameter is not properly validated or sanitized, enabling an attacker to supply crafted input that overflows the buffer. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on availability (A:H), meaning exploitation could cause denial of service conditions such as router crashes or reboots. Although the CVSS score is 7.5 (high), there is no indication that confidentiality or integrity are directly affected. No known exploits are currently reported in the wild, and no official patches or vendor advisories have been published yet. The vulnerability affects a specific Tenda router model and firmware version, which is commonly used in home and small office environments. Given the network exposure and ease of exploitation, attackers could leverage this flaw to disrupt network connectivity or potentially use it as a foothold for further attacks if combined with other vulnerabilities.
Potential Impact
For European organizations, the primary impact of CVE-2022-45660 lies in potential denial of service against network infrastructure relying on the Tenda AC6V1.0 routers. Disruption of Wi-Fi scheduling functionality could lead to intermittent or complete loss of wireless connectivity, affecting business operations, remote work, and IoT device communications. Small and medium enterprises (SMEs) and home offices using this router model may experience outages impacting productivity. While the vulnerability does not directly compromise data confidentiality or integrity, availability loss can indirectly affect operational continuity and service delivery. Additionally, if attackers gain persistent access through this or chained vulnerabilities, it could escalate to broader network compromise. The lack of patches increases the risk window, especially in environments where firmware updates are infrequent or unmanaged. Organizations with limited IT security resources may be more vulnerable to exploitation. Overall, the threat is significant for entities relying on this specific router model, particularly where network uptime is critical.
Mitigation Recommendations
Identify and inventory all Tenda AC6V1.0 routers running firmware version 15.03.05.19 within the organization’s network. Restrict remote network access to management interfaces of affected routers by implementing network segmentation and firewall rules limiting access to trusted IP addresses only. Disable or restrict the use of Wi-Fi scheduling features if not essential, to reduce the attack surface related to the vulnerable function. Monitor network traffic and device logs for unusual activity or repeated malformed requests targeting the schedStartTime parameter or related endpoints. Engage with Tenda support channels to request firmware updates or security advisories addressing this vulnerability; apply patches promptly once available. Implement compensating controls such as deploying additional network redundancy or failover mechanisms to mitigate potential denial of service impacts. Educate IT staff and users about the risks of using outdated router firmware and the importance of timely updates and secure configuration. Consider replacing affected devices with models from vendors with stronger security track records and active vulnerability management if patches are not forthcoming.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2022-45660: n/a in n/a
Description
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the schedStartTime parameter in the setSchedWifi function.
AI-Powered Analysis
Technical Analysis
CVE-2022-45660 is a high-severity buffer overflow vulnerability identified in the Tenda AC6V1.0 router firmware version 15.03.05.19. The flaw exists in the setSchedWifi function, specifically triggered via the schedStartTime parameter. Buffer overflow vulnerabilities (classified under CWE-120) occur when input data exceeds the allocated buffer size, potentially allowing an attacker to overwrite adjacent memory. In this case, the schedStartTime parameter is not properly validated or sanitized, enabling an attacker to supply crafted input that overflows the buffer. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on availability (A:H), meaning exploitation could cause denial of service conditions such as router crashes or reboots. Although the CVSS score is 7.5 (high), there is no indication that confidentiality or integrity are directly affected. No known exploits are currently reported in the wild, and no official patches or vendor advisories have been published yet. The vulnerability affects a specific Tenda router model and firmware version, which is commonly used in home and small office environments. Given the network exposure and ease of exploitation, attackers could leverage this flaw to disrupt network connectivity or potentially use it as a foothold for further attacks if combined with other vulnerabilities.
Potential Impact
For European organizations, the primary impact of CVE-2022-45660 lies in potential denial of service against network infrastructure relying on the Tenda AC6V1.0 routers. Disruption of Wi-Fi scheduling functionality could lead to intermittent or complete loss of wireless connectivity, affecting business operations, remote work, and IoT device communications. Small and medium enterprises (SMEs) and home offices using this router model may experience outages impacting productivity. While the vulnerability does not directly compromise data confidentiality or integrity, availability loss can indirectly affect operational continuity and service delivery. Additionally, if attackers gain persistent access through this or chained vulnerabilities, it could escalate to broader network compromise. The lack of patches increases the risk window, especially in environments where firmware updates are infrequent or unmanaged. Organizations with limited IT security resources may be more vulnerable to exploitation. Overall, the threat is significant for entities relying on this specific router model, particularly where network uptime is critical.
Mitigation Recommendations
Identify and inventory all Tenda AC6V1.0 routers running firmware version 15.03.05.19 within the organization’s network. Restrict remote network access to management interfaces of affected routers by implementing network segmentation and firewall rules limiting access to trusted IP addresses only. Disable or restrict the use of Wi-Fi scheduling features if not essential, to reduce the attack surface related to the vulnerable function. Monitor network traffic and device logs for unusual activity or repeated malformed requests targeting the schedStartTime parameter or related endpoints. Engage with Tenda support channels to request firmware updates or security advisories addressing this vulnerability; apply patches promptly once available. Implement compensating controls such as deploying additional network redundancy or failover mechanisms to mitigate potential denial of service impacts. Educate IT staff and users about the risks of using outdated router firmware and the importance of timely updates and secure configuration. Consider replacing affected devices with models from vendors with stronger security track records and active vulnerability management if patches are not forthcoming.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-11-21T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf0e81
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 6/22/2025, 2:21:07 AM
Last updated: 7/30/2025, 12:42:15 AM
Views: 9
Related Threats
CVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowCVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder
CriticalCVE-2025-9013: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.