CVE-2022-42156: n/a in n/a
D-Link COVR 1200,1203 v1.08 was discovered to contain a command injection vulnerability via the tomography_ping_number parameter at function SetNetworkTomographySettings.
AI Analysis
Technical Summary
CVE-2022-42156 is a high-severity command injection vulnerability affecting D-Link COVR 1200 and 1203 devices running firmware version 1.08. The vulnerability exists in the function SetNetworkTomographySettings, specifically via the 'tomography_ping_number' parameter. Command injection vulnerabilities occur when untrusted input is passed to a system shell or command interpreter without proper sanitization, allowing an attacker to execute arbitrary commands on the affected device. In this case, the vulnerable parameter allows an attacker with at least low privileges (PR:L) to remotely execute commands without requiring user interaction (UI:N). The CVSS v3.1 base score of 8.8 reflects the critical nature of this flaw, with network attack vector (AV:N), low attack complexity (AC:L), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this vulnerability could allow an attacker to take full control of the affected device, manipulate network traffic, disrupt service, or pivot into internal networks. Although no known exploits are reported in the wild yet, the vulnerability is publicly disclosed and could be weaponized. The CWE-77 classification confirms that this is a classic OS command injection issue. The lack of available patches at the time of reporting increases the urgency of mitigation efforts.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on D-Link COVR 1200/1203 devices for network connectivity and coverage. Successful exploitation could lead to full compromise of the affected routers, resulting in interception or manipulation of sensitive data, disruption of business operations due to network outages, and potential lateral movement into corporate networks. This is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government agencies within Europe. The high confidentiality impact risks exposure of personal and corporate data, potentially violating GDPR regulations. Moreover, compromised devices could be leveraged as part of botnets or for launching further attacks, amplifying the threat landscape. The absence of user interaction and the network-based attack vector make this vulnerability highly exploitable remotely, increasing the risk for distributed and remote work environments prevalent in Europe.
Mitigation Recommendations
European organizations using D-Link COVR 1200/1203 devices should immediately assess their exposure to this vulnerability. Specific mitigation steps include: 1) Isolate affected devices from critical network segments to limit potential lateral movement. 2) Restrict management interfaces to trusted IP addresses and disable remote management if not required. 3) Monitor network traffic for unusual patterns indicative of command injection attempts or unauthorized access. 4) Implement strict input validation and firewall rules where possible to block malicious payloads targeting the 'tomography_ping_number' parameter. 5) Engage with D-Link support channels to obtain firmware updates or patches as soon as they become available. 6) If patching is delayed, consider temporary replacement of vulnerable devices or deploying compensating controls such as network segmentation and enhanced logging. 7) Conduct regular vulnerability scans and penetration tests focusing on router configurations and firmware versions to detect exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2022-42156: n/a in n/a
Description
D-Link COVR 1200,1203 v1.08 was discovered to contain a command injection vulnerability via the tomography_ping_number parameter at function SetNetworkTomographySettings.
AI-Powered Analysis
Technical Analysis
CVE-2022-42156 is a high-severity command injection vulnerability affecting D-Link COVR 1200 and 1203 devices running firmware version 1.08. The vulnerability exists in the function SetNetworkTomographySettings, specifically via the 'tomography_ping_number' parameter. Command injection vulnerabilities occur when untrusted input is passed to a system shell or command interpreter without proper sanitization, allowing an attacker to execute arbitrary commands on the affected device. In this case, the vulnerable parameter allows an attacker with at least low privileges (PR:L) to remotely execute commands without requiring user interaction (UI:N). The CVSS v3.1 base score of 8.8 reflects the critical nature of this flaw, with network attack vector (AV:N), low attack complexity (AC:L), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this vulnerability could allow an attacker to take full control of the affected device, manipulate network traffic, disrupt service, or pivot into internal networks. Although no known exploits are reported in the wild yet, the vulnerability is publicly disclosed and could be weaponized. The CWE-77 classification confirms that this is a classic OS command injection issue. The lack of available patches at the time of reporting increases the urgency of mitigation efforts.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on D-Link COVR 1200/1203 devices for network connectivity and coverage. Successful exploitation could lead to full compromise of the affected routers, resulting in interception or manipulation of sensitive data, disruption of business operations due to network outages, and potential lateral movement into corporate networks. This is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government agencies within Europe. The high confidentiality impact risks exposure of personal and corporate data, potentially violating GDPR regulations. Moreover, compromised devices could be leveraged as part of botnets or for launching further attacks, amplifying the threat landscape. The absence of user interaction and the network-based attack vector make this vulnerability highly exploitable remotely, increasing the risk for distributed and remote work environments prevalent in Europe.
Mitigation Recommendations
European organizations using D-Link COVR 1200/1203 devices should immediately assess their exposure to this vulnerability. Specific mitigation steps include: 1) Isolate affected devices from critical network segments to limit potential lateral movement. 2) Restrict management interfaces to trusted IP addresses and disable remote management if not required. 3) Monitor network traffic for unusual patterns indicative of command injection attempts or unauthorized access. 4) Implement strict input validation and firewall rules where possible to block malicious payloads targeting the 'tomography_ping_number' parameter. 5) Engage with D-Link support channels to obtain firmware updates or patches as soon as they become available. 6) If patching is delayed, consider temporary replacement of vulnerable devices or deploying compensating controls such as network segmentation and enhanced logging. 7) Conduct regular vulnerability scans and penetration tests focusing on router configurations and firmware versions to detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-03T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec6b9
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 11:28:28 AM
Last updated: 8/1/2025, 10:34:06 AM
Views: 9
Related Threats
CVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57702: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57701: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.