ID

VAR-202211-1539


CVE

CVE-2022-44260


TITLE

TOTOLINK  of  lr350  Out-of-bounds write vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2022-021440

DESCRIPTION

TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter sPort/ePort in the setIpPortFilterRules function. TOTOLINK of lr350 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK LR350 is a 4G LTE router released by China's TOTOLINK Electronics. It converts 4G signals into wired signals and is suitable for home and office use. An attacker could exploit this vulnerability to cause remote code execution

Trust: 2.16

sources: NVD: CVE-2022-44260 // JVNDB: JVNDB-2022-021440 // CNVD: CNVD-2025-21016

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-21016

AFFECTED PRODUCTS

vendor:totolinkmodel:lr350scope:eqversion:9.3.5u.6369_b20220309

Trust: 1.0

vendor:totolinkmodel:lr350scope: - version: -

Trust: 0.8

vendor:totolinkmodel:lr350scope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:lr350scope:eqversion:lr350 firmware 9.3.5u.6369 b20220309

Trust: 0.8

vendor:totolinkmodel:lr350 v9.3.5u.6369 b20220309scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-21016 // JVNDB: JVNDB-2022-021440 // NVD: CVE-2022-44260

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-44260
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-44260
value: HIGH

Trust: 1.0

NVD: CVE-2022-44260
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-21016
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202211-3371
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-21016
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-44260
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-44260
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-21016 // CNNVD: CNNVD-202211-3371 // JVNDB: JVNDB-2022-021440 // NVD: CVE-2022-44260 // NVD: CVE-2022-44260

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-021440 // NVD: CVE-2022-44260

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202211-3371

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202211-3371

EXTERNAL IDS

db:NVDid:CVE-2022-44260

Trust: 3.8

db:JVNDBid:JVNDB-2022-021440

Trust: 0.8

db:CNVDid:CNVD-2025-21016

Trust: 0.6

db:CNNVDid:CNNVD-202211-3371

Trust: 0.6

sources: CNVD: CNVD-2025-21016 // CNNVD: CNNVD-202211-3371 // JVNDB: JVNDB-2022-021440 // NVD: CVE-2022-44260

REFERENCES

url:https://brief-nymphea-813.notion.site/lr350-bof-setipportfilterrules-0fad7347f4d74a919a79f5745a8c5421

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-44260

Trust: 1.4

url:https://cxsecurity.com/cveshow/cve-2022-44260/

Trust: 0.6

sources: CNVD: CNVD-2025-21016 // CNNVD: CNNVD-202211-3371 // JVNDB: JVNDB-2022-021440 // NVD: CVE-2022-44260

SOURCES

db:CNVDid:CNVD-2025-21016
db:CNNVDid:CNNVD-202211-3371
db:JVNDBid:JVNDB-2022-021440
db:NVDid:CVE-2022-44260

LAST UPDATE DATE

2025-09-12T23:41:39.702000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-21016date:2025-09-11T00:00:00
db:CNNVDid:CNNVD-202211-3371date:2022-11-28T00:00:00
db:JVNDBid:JVNDB-2022-021440date:2023-11-10T08:16:00
db:NVDid:CVE-2022-44260date:2025-04-25T20:15:34.280

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-21016date:2025-09-10T00:00:00
db:CNNVDid:CNNVD-202211-3371date:2022-11-23T00:00:00
db:JVNDBid:JVNDB-2022-021440date:2023-11-10T00:00:00
db:NVDid:CVE-2022-44260date:2022-11-23T16:15:11.023