ID

VAR-202211-1628


CVE

CVE-2022-44254


TITLE

TOTOLINK  of  lr350  Out-of-bounds write vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2022-021446

DESCRIPTION

TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter text in the setSmsCfg function. TOTOLINK of lr350 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK LR350 is a 4G LTE router released by China's TOTOLINK Electronics. It converts 4G signals into wired signals and is suitable for home and office use. An attacker could exploit this vulnerability to cause remote code execution

Trust: 2.16

sources: NVD: CVE-2022-44254 // JVNDB: JVNDB-2022-021446 // CNVD: CNVD-2025-21012

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-21012

AFFECTED PRODUCTS

vendor:totolinkmodel:lr350scope:eqversion:9.3.5u.6369_b20220309

Trust: 1.0

vendor:totolinkmodel:lr350scope: - version: -

Trust: 0.8

vendor:totolinkmodel:lr350scope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:lr350scope:eqversion:lr350 firmware 9.3.5u.6369 b20220309

Trust: 0.8

vendor:totolinkmodel:lr350 v9.3.5u.6369 b20220309scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-21012 // JVNDB: JVNDB-2022-021446 // NVD: CVE-2022-44254

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-44254
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-44254
value: HIGH

Trust: 1.0

NVD: CVE-2022-44254
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-21012
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202211-3376
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-21012
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-44254
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-44254
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-21012 // CNNVD: CNNVD-202211-3376 // JVNDB: JVNDB-2022-021446 // NVD: CVE-2022-44254 // NVD: CVE-2022-44254

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-021446 // NVD: CVE-2022-44254

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202211-3376

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202211-3376

EXTERNAL IDS

db:NVDid:CVE-2022-44254

Trust: 3.8

db:JVNDBid:JVNDB-2022-021446

Trust: 0.8

db:CNVDid:CNVD-2025-21012

Trust: 0.6

db:CNNVDid:CNNVD-202211-3376

Trust: 0.6

sources: CNVD: CNVD-2025-21012 // CNNVD: CNNVD-202211-3376 // JVNDB: JVNDB-2022-021446 // NVD: CVE-2022-44254

REFERENCES

url:https://brief-nymphea-813.notion.site/lr350-bof-setsmscfg-fd30228720dc4119911ed0b31c7c26c7

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-44254

Trust: 1.4

url:https://cxsecurity.com/cveshow/cve-2022-44254/

Trust: 0.6

sources: CNVD: CNVD-2025-21012 // CNNVD: CNNVD-202211-3376 // JVNDB: JVNDB-2022-021446 // NVD: CVE-2022-44254

SOURCES

db:CNVDid:CNVD-2025-21012
db:CNNVDid:CNNVD-202211-3376
db:JVNDBid:JVNDB-2022-021446
db:NVDid:CVE-2022-44254

LAST UPDATE DATE

2025-09-12T23:46:21.368000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-21012date:2025-09-11T00:00:00
db:CNNVDid:CNNVD-202211-3376date:2022-11-28T00:00:00
db:JVNDBid:JVNDB-2022-021446date:2023-11-10T08:16:00
db:NVDid:CVE-2022-44254date:2025-04-25T20:15:33.183

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-21012date:2025-09-10T00:00:00
db:CNNVDid:CNNVD-202211-3376date:2022-11-23T00:00:00
db:JVNDBid:JVNDB-2022-021446date:2023-11-10T00:00:00
db:NVDid:CVE-2022-44254date:2022-11-23T16:15:10.720