CVE-2022-45671: n/a in n/a
Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the appData parameter in the formSetAppFilterRule function.
AI Analysis
Technical Summary
CVE-2022-45671 is a high-severity buffer overflow vulnerability identified in the Tenda i22 router firmware version 1.0.0.3(4687). The vulnerability arises from improper handling of the 'appData' parameter within the 'formSetAppFilterRule' function. Specifically, this function fails to properly validate or limit the size of input data, leading to a classic stack-based buffer overflow (CWE-120). Exploiting this flaw requires no authentication or user interaction and can be triggered remotely over the network (AV:N), making it highly accessible to attackers. The vulnerability does not impact confidentiality or integrity directly but results in a complete denial of service (availability impact) by crashing or destabilizing the device. The CVSS 3.1 base score is 7.5 (high), reflecting the ease of exploitation and significant availability impact. No known public exploits or patches have been reported as of the published date (December 2, 2022). The Tenda i22 is a consumer-grade Wi-Fi 6 router, typically deployed in home and small office environments. The vulnerability could allow attackers to disrupt network connectivity by causing device reboots or crashes, potentially leading to extended downtime or network outages. Given the lack of authentication requirements, attackers can exploit this remotely without prior access, increasing the risk surface. The absence of patches or mitigations from the vendor at this time further elevates the threat level for affected devices still in use.
Potential Impact
For European organizations, especially small businesses and home office users relying on Tenda i22 routers, this vulnerability poses a significant risk to network availability. Disruption of internet connectivity can lead to operational downtime, loss of productivity, and potential secondary impacts if critical services depend on these routers. While the vulnerability does not directly compromise data confidentiality or integrity, the denial of service can indirectly affect business continuity and service delivery. In sectors where continuous connectivity is critical (e.g., remote work, telemedicine, financial services), even short outages can have outsized consequences. Additionally, widespread exploitation could be leveraged as part of larger distributed denial-of-service (DDoS) campaigns or to create network instability. The lack of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and absence of authentication requirements mean that threat actors could develop exploits rapidly. Organizations using Tenda i22 devices should consider the potential for targeted attacks or opportunistic scanning by attackers seeking vulnerable routers.
Mitigation Recommendations
1. Immediate mitigation involves isolating Tenda i22 routers from untrusted networks or limiting their exposure to the internet, for example by disabling remote management features or applying strict firewall rules to restrict access to the router's management interfaces. 2. Network segmentation can reduce the impact of a compromised or crashed router by limiting affected devices and services. 3. Monitor network traffic and device logs for unusual activity or repeated crashes that may indicate exploitation attempts. 4. Engage with Tenda support channels to obtain firmware updates or patches addressing this vulnerability; if none are available, consider upgrading to alternative router models with active security support. 5. For organizations deploying these routers in critical environments, implement redundancy in network infrastructure to maintain connectivity in case of device failure. 6. Educate users about the risks of exposing router management interfaces and encourage secure configuration practices. 7. Employ network intrusion detection systems (NIDS) capable of detecting anomalous traffic patterns associated with exploitation attempts targeting buffer overflow vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2022-45671: n/a in n/a
Description
Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the appData parameter in the formSetAppFilterRule function.
AI-Powered Analysis
Technical Analysis
CVE-2022-45671 is a high-severity buffer overflow vulnerability identified in the Tenda i22 router firmware version 1.0.0.3(4687). The vulnerability arises from improper handling of the 'appData' parameter within the 'formSetAppFilterRule' function. Specifically, this function fails to properly validate or limit the size of input data, leading to a classic stack-based buffer overflow (CWE-120). Exploiting this flaw requires no authentication or user interaction and can be triggered remotely over the network (AV:N), making it highly accessible to attackers. The vulnerability does not impact confidentiality or integrity directly but results in a complete denial of service (availability impact) by crashing or destabilizing the device. The CVSS 3.1 base score is 7.5 (high), reflecting the ease of exploitation and significant availability impact. No known public exploits or patches have been reported as of the published date (December 2, 2022). The Tenda i22 is a consumer-grade Wi-Fi 6 router, typically deployed in home and small office environments. The vulnerability could allow attackers to disrupt network connectivity by causing device reboots or crashes, potentially leading to extended downtime or network outages. Given the lack of authentication requirements, attackers can exploit this remotely without prior access, increasing the risk surface. The absence of patches or mitigations from the vendor at this time further elevates the threat level for affected devices still in use.
Potential Impact
For European organizations, especially small businesses and home office users relying on Tenda i22 routers, this vulnerability poses a significant risk to network availability. Disruption of internet connectivity can lead to operational downtime, loss of productivity, and potential secondary impacts if critical services depend on these routers. While the vulnerability does not directly compromise data confidentiality or integrity, the denial of service can indirectly affect business continuity and service delivery. In sectors where continuous connectivity is critical (e.g., remote work, telemedicine, financial services), even short outages can have outsized consequences. Additionally, widespread exploitation could be leveraged as part of larger distributed denial-of-service (DDoS) campaigns or to create network instability. The lack of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and absence of authentication requirements mean that threat actors could develop exploits rapidly. Organizations using Tenda i22 devices should consider the potential for targeted attacks or opportunistic scanning by attackers seeking vulnerable routers.
Mitigation Recommendations
1. Immediate mitigation involves isolating Tenda i22 routers from untrusted networks or limiting their exposure to the internet, for example by disabling remote management features or applying strict firewall rules to restrict access to the router's management interfaces. 2. Network segmentation can reduce the impact of a compromised or crashed router by limiting affected devices and services. 3. Monitor network traffic and device logs for unusual activity or repeated crashes that may indicate exploitation attempts. 4. Engage with Tenda support channels to obtain firmware updates or patches addressing this vulnerability; if none are available, consider upgrading to alternative router models with active security support. 5. For organizations deploying these routers in critical environments, implement redundancy in network infrastructure to maintain connectivity in case of device failure. 6. Educate users about the risks of exposing router management interfaces and encourage secure configuration practices. 7. Employ network intrusion detection systems (NIDS) capable of detecting anomalous traffic patterns associated with exploitation attempts targeting buffer overflow vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-11-21T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf0ea1
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 6/22/2025, 2:07:23 AM
Last updated: 2/7/2026, 12:03:58 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.