{"vulnerability": "CVE-2022-4566", "sightings": [{"uuid": "d2f79b2e-49ad-409e-8551-a51518e59b69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45665", "type": "seen", "source": "https://t.me/cibsecurity/54972", "content": "\u203c CVE-2022-45665 \u203c\n\nTenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the funcpara1 parameter in the formSetCfm function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-20T18:12:56.000000Z"}, {"uuid": "bc5fe64c-f439-4ba1-aa57-dea08ba8acfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4566", "type": "seen", "source": "https://t.me/cibsecurity/54781", "content": "\u203c CVE-2022-4566 \u203c\n\nA vulnerability, which was classified as critical, has been found in y_project RuoYi 4.7.5. This issue affects some unknown processing of the file com/ruoyi/generator/controller/GenController. The manipulation leads to sql injection. The name of the patch is 167970e5c4da7bb46217f576dc50622b83f32b40. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215975.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-16T22:24:39.000000Z"}, {"uuid": "00f87f0e-e52b-4e73-9517-584c3b44bf31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45669", "type": "seen", "source": "https://t.me/cibsecurity/53817", "content": "\u203c CVE-2022-45669 \u203c\n\nTenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterGet function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-02T20:37:17.000000Z"}, {"uuid": "16a02379-2873-4005-a648-c0569ca4bb4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45667", "type": "seen", "source": "https://t.me/cibsecurity/53812", "content": "\u203c CVE-2022-45667 \u203c\n\nTenda i22 V1.0.0.3(4687) is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-02T20:37:10.000000Z"}, {"uuid": "b56aad2f-48e9-42b8-9d83-17dbabb56f49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45668", "type": "seen", "source": "https://t.me/cibsecurity/53824", "content": "\u203c CVE-2022-45668 \u203c\n\nTenda i22 V1.0.0.3(4687) is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolReboot.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-02T20:37:27.000000Z"}, {"uuid": "3db1a1a4-4168-43a8-974d-2d94b290515b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45667", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13048", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45667\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda i22 V1.0.0.3(4687) is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet.\n\ud83d\udccf Published: 2022-12-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-23T14:55:41.941Z\n\ud83d\udd17 References:\n1. https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolRestoreSet/fromSysToolRestoreSet.md", "creation_timestamp": "2025-04-23T15:04:35.000000Z"}, {"uuid": "d57f7403-8ad5-4516-9bc4-ee0146073bde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45666", "type": "seen", "source": "https://t.me/cibsecurity/54967", "content": "\u203c CVE-2022-45666 \u203c\n\nTenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDset function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-20T18:12:49.000000Z"}]}