First published: Thu Nov 03 2022(Updated: )
D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-823g Firmware | =1.0.2 | |
Dlink Dir-823g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43109 is a command injection vulnerability found in D-Link DIR-823G v1.0.2.
CVE-2022-43109 has a severity rating of 9.8 (critical).
The affected software is Dlink Dir-823g Firmware version 1.0.2.
An attacker can exploit CVE-2022-43109 by sending crafted packets to the vulnerable device, allowing them to execute arbitrary commands.
Yes, you can find references for CVE-2022-43109 at the following links: [Reference 1](https://github.com/ppcrab/IOT_FIRMWARE/blob/main/%E5%8F%8B%E8%AE%AF/dir-823g/cve_v1.0.2.pdf) and [Reference 2](https://www.dlink.com/en/security-bulletin/).