CWE
787 119
Advisory Published
Updated

CVE-2022-44807: Buffer Overflow

First published: Tue Nov 22 2022(Updated: )

D-Link DIR-882 1.10B02 and 1.20B06 is vulnerable to Buffer Overflow via webGetVarString.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Dlink Dir-882 Firmware=1.10b02
Dlink Dir-882 Firmware=1.20b06
Dlink Dir-882

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-44807?

    The severity of CVE-2022-44807 is critical, with a severity value of 9.8.

  • Which D-Link DIR-882 firmware versions are affected by CVE-2022-44807?

    D-Link DIR-882 firmware versions 1.10B02 and 1.20B06 are affected by CVE-2022-44807.

  • How does CVE-2022-44807 exploit the vulnerability?

    CVE-2022-44807 exploits a buffer overflow vulnerability through the webGetVarString function.

  • Are there any fixes or patches available for CVE-2022-44807?

    Yes, D-Link has released firmware updates to address the vulnerability. Please refer to the D-Link security bulletin for more information.

  • Where can I find more information about CVE-2022-44807?

    You can find more information about CVE-2022-44807 in the GitHub repository provided by the researcher and the D-Link security bulletin.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203