Skip to main content

CVE-2022-43109: n/a in n/a

Critical
VulnerabilityCVE-2022-43109cvecve-2022-43109
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet.

AI-Powered Analysis

AILast updated: 07/03/2025, 14:11:14 UTC

Technical Analysis

CVE-2022-43109 is a critical command injection vulnerability identified in the D-Link DIR-823G router, specifically version 1.0.2. The vulnerability exists within the function SetNetworkTomographySettings, which processes network tomography configuration packets. An attacker can exploit this flaw by sending a specially crafted packet to the device, which is then improperly handled by the vulnerable function, allowing arbitrary command execution on the underlying operating system. This type of vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection')). The CVSS v3.1 base score is 9.8, indicating a critical severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the attack can be performed remotely over the network without any privileges or user interaction, and successful exploitation results in full confidentiality, integrity, and availability compromise. Although no known exploits are currently reported in the wild, the ease of exploitation and the high impact make this vulnerability a significant threat. The lack of available patches or vendor advisories at the time of publication increases the urgency for affected users to take mitigating actions. The D-Link DIR-823G is a consumer and small office/home office (SOHO) router, which may be deployed in various environments, including European households and small businesses.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on the D-Link DIR-823G router, this vulnerability poses a severe risk. Successful exploitation can lead to complete takeover of the router, enabling attackers to intercept, modify, or block network traffic, deploy malware, pivot into internal networks, or disrupt internet connectivity. Confidential data traversing the network can be compromised, and the integrity of communications undermined. The availability of network services can be disrupted, causing operational downtime. Given the critical CVSS score and the fact that exploitation requires no authentication or user interaction, attackers could scan for vulnerable devices across Europe and launch automated attacks. This could lead to widespread compromise of network infrastructure in homes and small offices, potentially impacting remote work setups, IoT device security, and overall network trustworthiness. The absence of known exploits in the wild currently provides a window for mitigation, but the risk of imminent exploitation remains high.

Mitigation Recommendations

1. Immediate actions should include isolating affected D-Link DIR-823G routers from critical networks until a patch or firmware update is available. 2. Monitor network traffic for unusual packets or commands targeting the SetNetworkTomographySettings function or related network tomography features. 3. Disable network tomography features or remote management interfaces if possible to reduce the attack surface. 4. Restrict access to the router's management interfaces to trusted IP addresses or internal networks only. 5. Employ network segmentation to limit the impact of a compromised router on sensitive systems. 6. Use intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect attempts to exploit this vulnerability. 7. Regularly check for vendor advisories and apply firmware updates as soon as they are released. 8. Educate users about the risks of using outdated router firmware and encourage timely updates. 9. Consider replacing vulnerable devices with models that have active security support if patches are not forthcoming.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdcc44

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 2:11:14 PM

Last updated: 7/29/2025, 6:45:35 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats