CVE-2022-45664: n/a in n/a
Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDget function.
AI Analysis
Technical Summary
CVE-2022-45664 is a high-severity buffer overflow vulnerability identified in the Tenda i22 wireless router firmware version V1.0.0.3(4687). The vulnerability arises from improper handling of the 'list' parameter within the formwrlSSIDget function. Specifically, the buffer overflow occurs when the input to this parameter exceeds the expected bounds, leading to memory corruption. This type of vulnerability is classified under CWE-120, which relates to classic buffer overflow issues where a program writes more data to a buffer than it can hold. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on availability (A:H), meaning successful exploitation can cause denial of service conditions such as device crashes or reboots. There is no indication of confidentiality or integrity impact, nor are there known exploits in the wild or available patches at the time of publication. The affected product is the Tenda i22 router, a consumer-grade wireless access device. The lack of detailed vendor or product information beyond the model and firmware version limits the scope of technical specifics, but the vulnerability's nature suggests that attackers could send crafted network requests to trigger the overflow and disrupt device operation.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of network connectivity and availability due to router crashes or reboots. Since the Tenda i22 is a consumer-grade wireless router, its presence in enterprise or critical infrastructure environments may be limited, but small offices, home offices (SOHO), and remote workers could be affected. Disruption in wireless connectivity could impede business operations, remote access, and communication. Additionally, compromised routers could be leveraged as entry points for further attacks or as part of botnets if attackers develop exploits in the future. The absence of confidentiality or integrity impact reduces the risk of data breaches directly from this vulnerability, but availability impacts can still cause operational downtime and productivity loss. Organizations relying on Tenda i22 devices should be aware of this risk, especially in sectors with high dependence on stable network infrastructure such as finance, healthcare, and government services.
Mitigation Recommendations
Given the lack of an official patch or vendor advisory, mitigation should focus on network-level controls and device management best practices. Specific recommendations include: 1) Isolate Tenda i22 devices on segmented network zones with limited access to critical systems to contain potential disruptions. 2) Implement network intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection to monitor for unusual traffic patterns targeting the router's management interfaces. 3) Disable remote management features on the router if enabled, reducing exposure to external attackers. 4) Regularly audit and inventory network devices to identify and replace vulnerable Tenda i22 units with updated or alternative hardware where possible. 5) Employ strict firewall rules to restrict access to router management ports (e.g., HTTP, HTTPS, Telnet) from untrusted networks. 6) Monitor device logs for signs of crashes or abnormal behavior indicating exploitation attempts. 7) Engage with Tenda support channels to seek firmware updates or official patches and apply them promptly once available. These measures go beyond generic advice by focusing on network segmentation, monitoring, and device lifecycle management tailored to the specific router model and vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2022-45664: n/a in n/a
Description
Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDget function.
AI-Powered Analysis
Technical Analysis
CVE-2022-45664 is a high-severity buffer overflow vulnerability identified in the Tenda i22 wireless router firmware version V1.0.0.3(4687). The vulnerability arises from improper handling of the 'list' parameter within the formwrlSSIDget function. Specifically, the buffer overflow occurs when the input to this parameter exceeds the expected bounds, leading to memory corruption. This type of vulnerability is classified under CWE-120, which relates to classic buffer overflow issues where a program writes more data to a buffer than it can hold. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on availability (A:H), meaning successful exploitation can cause denial of service conditions such as device crashes or reboots. There is no indication of confidentiality or integrity impact, nor are there known exploits in the wild or available patches at the time of publication. The affected product is the Tenda i22 router, a consumer-grade wireless access device. The lack of detailed vendor or product information beyond the model and firmware version limits the scope of technical specifics, but the vulnerability's nature suggests that attackers could send crafted network requests to trigger the overflow and disrupt device operation.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of network connectivity and availability due to router crashes or reboots. Since the Tenda i22 is a consumer-grade wireless router, its presence in enterprise or critical infrastructure environments may be limited, but small offices, home offices (SOHO), and remote workers could be affected. Disruption in wireless connectivity could impede business operations, remote access, and communication. Additionally, compromised routers could be leveraged as entry points for further attacks or as part of botnets if attackers develop exploits in the future. The absence of confidentiality or integrity impact reduces the risk of data breaches directly from this vulnerability, but availability impacts can still cause operational downtime and productivity loss. Organizations relying on Tenda i22 devices should be aware of this risk, especially in sectors with high dependence on stable network infrastructure such as finance, healthcare, and government services.
Mitigation Recommendations
Given the lack of an official patch or vendor advisory, mitigation should focus on network-level controls and device management best practices. Specific recommendations include: 1) Isolate Tenda i22 devices on segmented network zones with limited access to critical systems to contain potential disruptions. 2) Implement network intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection to monitor for unusual traffic patterns targeting the router's management interfaces. 3) Disable remote management features on the router if enabled, reducing exposure to external attackers. 4) Regularly audit and inventory network devices to identify and replace vulnerable Tenda i22 units with updated or alternative hardware where possible. 5) Employ strict firewall rules to restrict access to router management ports (e.g., HTTP, HTTPS, Telnet) from untrusted networks. 6) Monitor device logs for signs of crashes or abnormal behavior indicating exploitation attempts. 7) Engage with Tenda support channels to seek firmware updates or official patches and apply them promptly once available. These measures go beyond generic advice by focusing on network segmentation, monitoring, and device lifecycle management tailored to the specific router model and vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-11-21T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d983fc4522896dcbf0e20
Added to database: 5/21/2025, 9:09:19 AM
Last enriched: 6/22/2025, 2:35:49 AM
Last updated: 8/17/2025, 10:27:59 AM
Views: 11
Related Threats
CVE-2025-3495: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Delta Electronics COMMGR
CriticalCVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.