First published: Tue Nov 29 2022(Updated: )
Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DNR-322L Firmware | <=2.60b15 | |
Dlink DNR-322L Firmware | ||
All of | ||
D-Link DNR-322L Firmware | <=2.60b15 | |
Dlink DNR-322L Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40799 has a severity rating of high due to its potential to allow authenticated attackers to execute OS level commands.
To fix CVE-2022-40799, upgrade the D-Link DNR-322L firmware to a version higher than 2.60B15.
CVE-2022-40799 affects the D-Link DNR-322L firmware versions 2.60B15 and lower.
CVE-2022-40799 is classified as a data integrity failure that allows command execution.
CVE-2022-40799 requires authentication, meaning an attacker must first gain access to the device to exploit it.