Skip to main content

CVE-2022-45670: n/a in n/a

High
VulnerabilityCVE-2022-45670cvecve-2022-45670n-acwe-120
Published: Fri Dec 02 2022 (12/02/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the ping1 parameter in the formSetAutoPing function.

AI-Powered Analysis

AILast updated: 06/22/2025, 02:35:20 UTC

Technical Analysis

CVE-2022-45670 is a high-severity buffer overflow vulnerability identified in the Tenda i22 router firmware version V1.0.0.3(4687). The flaw exists in the formSetAutoPing function, specifically triggered via the ping1 parameter. Buffer overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory. In this case, the vulnerability can be exploited remotely over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts availability (A:H) but not confidentiality or integrity, meaning an attacker could cause a denial of service (DoS) condition by crashing or destabilizing the device. The vulnerability is classified under CWE-120, which corresponds to classic buffer overflow issues. No patches or vendor advisories are currently available, and no known exploits have been reported in the wild. Given the nature of the vulnerability and the affected device type (a consumer-grade router), exploitation could disrupt network connectivity for users relying on the Tenda i22 router. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts. However, the impact is limited to availability rather than data compromise or privilege escalation. The vulnerability was published on December 2, 2022, and has a CVSS v3.1 base score of 7.5, reflecting its high severity primarily due to ease of exploitation and potential for service disruption.

Potential Impact

For European organizations, the primary impact of CVE-2022-45670 is the potential disruption of network availability caused by denial of service attacks against Tenda i22 routers. This could affect small and medium enterprises or home office environments that utilize this router model, leading to loss of internet connectivity and interruption of business operations. Although the vulnerability does not directly compromise data confidentiality or integrity, the resulting network outages could hinder critical services, remote work capabilities, and access to cloud resources. Organizations relying on these routers for perimeter or internal network connectivity may experience degraded security posture due to forced network downtime. Additionally, if attackers leverage this vulnerability as part of a larger attack chain, it could facilitate lateral movement or distraction during more sophisticated intrusions. The absence of known exploits reduces immediate risk, but the ease of remote exploitation without credentials means that automated scanning and exploitation could emerge rapidly if proof-of-concept code is developed. European entities with limited IT support or outdated network equipment are particularly vulnerable to operational impacts from such disruptions.

Mitigation Recommendations

1. Immediate mitigation involves isolating Tenda i22 routers from direct exposure to untrusted networks, especially the internet, by placing them behind firewalls or network segmentation to limit access to the vulnerable ping1 parameter interface. 2. Network administrators should monitor router logs and network traffic for unusual ICMP or ping-related requests that could indicate exploitation attempts targeting the formSetAutoPing function. 3. Where possible, replace affected Tenda i22 devices with routers from vendors providing timely security updates and support. 4. Implement strict access control policies to restrict management interfaces to trusted internal networks and authorized personnel only. 5. Regularly audit network devices for firmware versions and known vulnerabilities, prioritizing updates or replacements for devices lacking vendor patches. 6. Employ network intrusion detection systems (NIDS) with signatures or heuristics capable of detecting buffer overflow exploitation attempts or anomalous ping traffic patterns. 7. Engage with Tenda support channels to request official patches or firmware updates addressing this vulnerability. 8. As a temporary workaround, disable or restrict the auto-ping functionality if configurable via the router’s management interface to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-21T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983fc4522896dcbf0e37

Added to database: 5/21/2025, 9:09:19 AM

Last enriched: 6/22/2025, 2:35:20 AM

Last updated: 8/4/2025, 6:36:15 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats