CVE-2022-43109: n/a in n/a
D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet.
AI Analysis
Technical Summary
CVE-2022-43109 is a critical command injection vulnerability identified in the D-Link DIR-823G router, specifically version 1.0.2. The vulnerability exists within the function SetNetworkTomographySettings, which processes network tomography configuration packets. An attacker can exploit this flaw by sending a specially crafted packet to the device, which is then improperly handled by the vulnerable function, allowing arbitrary command execution on the underlying operating system. This type of vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection')). The CVSS v3.1 base score is 9.8, indicating a critical severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the attack can be performed remotely over the network without any privileges or user interaction, and successful exploitation results in full confidentiality, integrity, and availability compromise. Although no known exploits are currently reported in the wild, the ease of exploitation and the high impact make this vulnerability a significant threat. The lack of available patches or vendor advisories at the time of publication increases the urgency for affected users to take mitigating actions. The D-Link DIR-823G is a consumer and small office/home office (SOHO) router, which may be deployed in various environments, including European households and small businesses.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home office users relying on the D-Link DIR-823G router, this vulnerability poses a severe risk. Successful exploitation can lead to complete takeover of the router, enabling attackers to intercept, modify, or block network traffic, deploy malware, pivot into internal networks, or disrupt internet connectivity. Confidential data traversing the network can be compromised, and the integrity of communications undermined. The availability of network services can be disrupted, causing operational downtime. Given the critical CVSS score and the fact that exploitation requires no authentication or user interaction, attackers could scan for vulnerable devices across Europe and launch automated attacks. This could lead to widespread compromise of network infrastructure in homes and small offices, potentially impacting remote work setups, IoT device security, and overall network trustworthiness. The absence of known exploits in the wild currently provides a window for mitigation, but the risk of imminent exploitation remains high.
Mitigation Recommendations
1. Immediate actions should include isolating affected D-Link DIR-823G routers from critical networks until a patch or firmware update is available. 2. Monitor network traffic for unusual packets or commands targeting the SetNetworkTomographySettings function or related network tomography features. 3. Disable network tomography features or remote management interfaces if possible to reduce the attack surface. 4. Restrict access to the router's management interfaces to trusted IP addresses or internal networks only. 5. Employ network segmentation to limit the impact of a compromised router on sensitive systems. 6. Use intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect attempts to exploit this vulnerability. 7. Regularly check for vendor advisories and apply firmware updates as soon as they are released. 8. Educate users about the risks of using outdated router firmware and encourage timely updates. 9. Consider replacing vulnerable devices with models that have active security support if patches are not forthcoming.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2022-43109: n/a in n/a
Description
D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet.
AI-Powered Analysis
Technical Analysis
CVE-2022-43109 is a critical command injection vulnerability identified in the D-Link DIR-823G router, specifically version 1.0.2. The vulnerability exists within the function SetNetworkTomographySettings, which processes network tomography configuration packets. An attacker can exploit this flaw by sending a specially crafted packet to the device, which is then improperly handled by the vulnerable function, allowing arbitrary command execution on the underlying operating system. This type of vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection')). The CVSS v3.1 base score is 9.8, indicating a critical severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the attack can be performed remotely over the network without any privileges or user interaction, and successful exploitation results in full confidentiality, integrity, and availability compromise. Although no known exploits are currently reported in the wild, the ease of exploitation and the high impact make this vulnerability a significant threat. The lack of available patches or vendor advisories at the time of publication increases the urgency for affected users to take mitigating actions. The D-Link DIR-823G is a consumer and small office/home office (SOHO) router, which may be deployed in various environments, including European households and small businesses.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home office users relying on the D-Link DIR-823G router, this vulnerability poses a severe risk. Successful exploitation can lead to complete takeover of the router, enabling attackers to intercept, modify, or block network traffic, deploy malware, pivot into internal networks, or disrupt internet connectivity. Confidential data traversing the network can be compromised, and the integrity of communications undermined. The availability of network services can be disrupted, causing operational downtime. Given the critical CVSS score and the fact that exploitation requires no authentication or user interaction, attackers could scan for vulnerable devices across Europe and launch automated attacks. This could lead to widespread compromise of network infrastructure in homes and small offices, potentially impacting remote work setups, IoT device security, and overall network trustworthiness. The absence of known exploits in the wild currently provides a window for mitigation, but the risk of imminent exploitation remains high.
Mitigation Recommendations
1. Immediate actions should include isolating affected D-Link DIR-823G routers from critical networks until a patch or firmware update is available. 2. Monitor network traffic for unusual packets or commands targeting the SetNetworkTomographySettings function or related network tomography features. 3. Disable network tomography features or remote management interfaces if possible to reduce the attack surface. 4. Restrict access to the router's management interfaces to trusted IP addresses or internal networks only. 5. Employ network segmentation to limit the impact of a compromised router on sensitive systems. 6. Use intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect attempts to exploit this vulnerability. 7. Regularly check for vendor advisories and apply firmware updates as soon as they are released. 8. Educate users about the risks of using outdated router firmware and encourage timely updates. 9. Consider replacing vulnerable devices with models that have active security support if patches are not forthcoming.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-17T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdcc44
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/3/2025, 2:11:14 PM
Last updated: 7/29/2025, 6:45:35 AM
Views: 9
Related Threats
CVE-2025-8971: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8970: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50515: n/a
UnknownCVE-2025-50817: n/a
UnknownCVE-2025-55195: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in denoland std
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.