CVE-2022-43109

D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-823g_firmware:1.0.2:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-823g:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:25

Type Values Removed Values Added
References () https://github.com/ppcrab/IOT_FIRMWARE/blob/main/%E5%8F%8B%E8%AE%AF/dir-823g/cve_v1.0.2.pdf - Exploit, Third Party Advisory () https://github.com/ppcrab/IOT_FIRMWARE/blob/main/%E5%8F%8B%E8%AE%AF/dir-823g/cve_v1.0.2.pdf - Exploit, Third Party Advisory
References () https://www.dlink.com/en/security-bulletin/ - Vendor Advisory () https://www.dlink.com/en/security-bulletin/ - Vendor Advisory

Information

Published : 2022-11-03 14:15

Updated : 2024-11-21 07:25


NVD link : CVE-2022-43109

Mitre link : CVE-2022-43109

CVE.ORG link : CVE-2022-43109


JSON object : View

Products Affected

dlink

  • dir-823g_firmware
  • dir-823g
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')