Skip to main content

CVE-2022-42156: n/a in n/a

High
VulnerabilityCVE-2022-42156cvecve-2022-42156
Published: Thu Oct 13 2022 (10/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

D-Link COVR 1200,1203 v1.08 was discovered to contain a command injection vulnerability via the tomography_ping_number parameter at function SetNetworkTomographySettings.

AI-Powered Analysis

AILast updated: 07/06/2025, 11:28:28 UTC

Technical Analysis

CVE-2022-42156 is a high-severity command injection vulnerability affecting D-Link COVR 1200 and 1203 devices running firmware version 1.08. The vulnerability exists in the function SetNetworkTomographySettings, specifically via the 'tomography_ping_number' parameter. Command injection vulnerabilities occur when untrusted input is passed to a system shell or command interpreter without proper sanitization, allowing an attacker to execute arbitrary commands on the affected device. In this case, the vulnerable parameter allows an attacker with at least low privileges (PR:L) to remotely execute commands without requiring user interaction (UI:N). The CVSS v3.1 base score of 8.8 reflects the critical nature of this flaw, with network attack vector (AV:N), low attack complexity (AC:L), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this vulnerability could allow an attacker to take full control of the affected device, manipulate network traffic, disrupt service, or pivot into internal networks. Although no known exploits are reported in the wild yet, the vulnerability is publicly disclosed and could be weaponized. The CWE-77 classification confirms that this is a classic OS command injection issue. The lack of available patches at the time of reporting increases the urgency of mitigation efforts.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on D-Link COVR 1200/1203 devices for network connectivity and coverage. Successful exploitation could lead to full compromise of the affected routers, resulting in interception or manipulation of sensitive data, disruption of business operations due to network outages, and potential lateral movement into corporate networks. This is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government agencies within Europe. The high confidentiality impact risks exposure of personal and corporate data, potentially violating GDPR regulations. Moreover, compromised devices could be leveraged as part of botnets or for launching further attacks, amplifying the threat landscape. The absence of user interaction and the network-based attack vector make this vulnerability highly exploitable remotely, increasing the risk for distributed and remote work environments prevalent in Europe.

Mitigation Recommendations

European organizations using D-Link COVR 1200/1203 devices should immediately assess their exposure to this vulnerability. Specific mitigation steps include: 1) Isolate affected devices from critical network segments to limit potential lateral movement. 2) Restrict management interfaces to trusted IP addresses and disable remote management if not required. 3) Monitor network traffic for unusual patterns indicative of command injection attempts or unauthorized access. 4) Implement strict input validation and firewall rules where possible to block malicious payloads targeting the 'tomography_ping_number' parameter. 5) Engage with D-Link support channels to obtain firmware updates or patches as soon as they become available. 6) If patching is delayed, consider temporary replacement of vulnerable devices or deploying compensating controls such as network segmentation and enhanced logging. 7) Conduct regular vulnerability scans and penetration tests focusing on router configurations and firmware versions to detect exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec6b9

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 11:28:28 AM

Last updated: 8/1/2025, 10:34:06 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats