CVE-2022-45663: n/a in n/a
Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterSet function.
AI Analysis
Technical Summary
CVE-2022-45663 is a high-severity buffer overflow vulnerability identified in the Tenda i22 wireless router firmware version V1.0.0.3(4687). The vulnerability exists in the formWifiMacFilterSet function, specifically triggered via the 'index' parameter. Buffer overflow vulnerabilities such as this arise when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory. In this case, improper bounds checking on the 'index' parameter allows an attacker to overflow the buffer. The vulnerability is remotely exploitable over the network (Attack Vector: Network), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit. The impact is primarily on availability (A:H), meaning successful exploitation could lead to denial of service conditions such as router crashes or reboots. The CVSS v3.1 base score is 7.5, indicating a high severity level. There is no indication of impact on confidentiality or integrity, nor is there evidence of known exploits in the wild. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), a well-known category of memory corruption bugs that can sometimes be leveraged for code execution, though no such impact is explicitly stated here. No patches or vendor advisories have been linked, suggesting that mitigation may currently rely on workarounds or firmware updates if and when released. Given the critical role of routers in network infrastructure, exploitation could disrupt network availability for affected users or organizations.
Potential Impact
For European organizations, the primary impact of CVE-2022-45663 is the potential disruption of network availability due to router crashes or denial of service. This could affect both home office setups and small to medium enterprise environments that deploy the Tenda i22 router. Loss of router availability can interrupt business operations, degrade productivity, and potentially expose organizations to secondary risks if fallback or failover mechanisms are inadequate. While confidentiality and integrity impacts are not indicated, the disruption of network services can indirectly affect security monitoring and incident response capabilities. The lack of authentication or user interaction requirements increases the risk of automated or remote exploitation attempts. Organizations relying on Tenda i22 devices without updated firmware or mitigations may face increased exposure, especially in environments with critical uptime requirements. Additionally, given the router’s role as a network gateway, successful exploitation could be a stepping stone for further attacks if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
1. Immediate mitigation should focus on network segmentation to isolate Tenda i22 devices from critical infrastructure and sensitive data networks, limiting the blast radius of potential exploitation. 2. Monitor network traffic for unusual patterns or repeated requests targeting the router’s management interfaces, which could indicate exploitation attempts. 3. Disable remote management interfaces on the Tenda i22 routers if enabled, reducing the attack surface. 4. Apply strict access control lists (ACLs) to restrict management access to trusted IP addresses only. 5. Regularly check for firmware updates from Tenda and apply them promptly once available to address this vulnerability. 6. If firmware updates are not available, consider replacing affected devices with models from vendors with active security support. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts targeting router management functions. 8. Conduct internal audits to identify all Tenda i22 devices in the network to ensure comprehensive coverage of mitigation efforts. 9. Educate IT staff on this vulnerability and the importance of router security hygiene to prevent exploitation.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2022-45663: n/a in n/a
Description
Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterSet function.
AI-Powered Analysis
Technical Analysis
CVE-2022-45663 is a high-severity buffer overflow vulnerability identified in the Tenda i22 wireless router firmware version V1.0.0.3(4687). The vulnerability exists in the formWifiMacFilterSet function, specifically triggered via the 'index' parameter. Buffer overflow vulnerabilities such as this arise when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory. In this case, improper bounds checking on the 'index' parameter allows an attacker to overflow the buffer. The vulnerability is remotely exploitable over the network (Attack Vector: Network), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit. The impact is primarily on availability (A:H), meaning successful exploitation could lead to denial of service conditions such as router crashes or reboots. The CVSS v3.1 base score is 7.5, indicating a high severity level. There is no indication of impact on confidentiality or integrity, nor is there evidence of known exploits in the wild. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), a well-known category of memory corruption bugs that can sometimes be leveraged for code execution, though no such impact is explicitly stated here. No patches or vendor advisories have been linked, suggesting that mitigation may currently rely on workarounds or firmware updates if and when released. Given the critical role of routers in network infrastructure, exploitation could disrupt network availability for affected users or organizations.
Potential Impact
For European organizations, the primary impact of CVE-2022-45663 is the potential disruption of network availability due to router crashes or denial of service. This could affect both home office setups and small to medium enterprise environments that deploy the Tenda i22 router. Loss of router availability can interrupt business operations, degrade productivity, and potentially expose organizations to secondary risks if fallback or failover mechanisms are inadequate. While confidentiality and integrity impacts are not indicated, the disruption of network services can indirectly affect security monitoring and incident response capabilities. The lack of authentication or user interaction requirements increases the risk of automated or remote exploitation attempts. Organizations relying on Tenda i22 devices without updated firmware or mitigations may face increased exposure, especially in environments with critical uptime requirements. Additionally, given the router’s role as a network gateway, successful exploitation could be a stepping stone for further attacks if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
1. Immediate mitigation should focus on network segmentation to isolate Tenda i22 devices from critical infrastructure and sensitive data networks, limiting the blast radius of potential exploitation. 2. Monitor network traffic for unusual patterns or repeated requests targeting the router’s management interfaces, which could indicate exploitation attempts. 3. Disable remote management interfaces on the Tenda i22 routers if enabled, reducing the attack surface. 4. Apply strict access control lists (ACLs) to restrict management access to trusted IP addresses only. 5. Regularly check for firmware updates from Tenda and apply them promptly once available to address this vulnerability. 6. If firmware updates are not available, consider replacing affected devices with models from vendors with active security support. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts targeting router management functions. 8. Conduct internal audits to identify all Tenda i22 devices in the network to ensure comprehensive coverage of mitigation efforts. 9. Educate IT staff on this vulnerability and the importance of router security hygiene to prevent exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-11-21T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d983fc4522896dcbf0e11
Added to database: 5/21/2025, 9:09:19 AM
Last enriched: 6/22/2025, 2:35:59 AM
Last updated: 7/6/2025, 4:50:34 AM
Views: 6
Related Threats
CVE-2025-2800: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpeventmanager WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce
HighCVE-2025-2799: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpeventmanager WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce
MediumCVE-2025-53842: Use of hard-coded credentials in ZEXELON CO., LTD. ZWX-2000CSW2-HN
MediumCVE-2025-6977: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in metagauss ProfileGrid – User Profiles, Groups and Communities
MediumCVE-2025-53958
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.