Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-44201: n/a in n/a

0
Critical
VulnerabilityCVE-2022-44201cvecve-2022-44201
Published: Tue Nov 22 2022 (11/22/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

D-Link DIR823G 1.02B05 is vulnerable to Commad Injection.

AI-Powered Analysis

AILast updated: 06/22/2025, 07:50:57 UTC

Technical Analysis

CVE-2022-44201 is a critical command injection vulnerability affecting the D-Link DIR823G router, specifically version 1.02B05. Command injection vulnerabilities (CWE-78) allow an attacker to execute arbitrary commands on the underlying operating system of the affected device. In this case, the vulnerability enables remote attackers to execute system-level commands without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The attack vector is network-based, meaning exploitation can occur remotely over the network without requiring physical access or prior credentials. The vulnerability impacts confidentiality, integrity, and availability (all rated high), allowing an attacker to potentially take full control of the device, intercept or manipulate network traffic, disrupt network services, or pivot to other internal systems. The lack of available patches or vendor-provided mitigations at the time of publication increases the risk. Although no known exploits in the wild have been reported yet, the high severity and ease of exploitation make this a significant threat to users of the affected router model. The vulnerability is particularly dangerous because routers serve as critical network infrastructure, and compromise can lead to widespread network disruption or data breaches.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. The D-Link DIR823G router is commonly used in small to medium-sized enterprises and residential environments, which means that many organizations could be using this device as their primary gateway to the internet. Exploitation could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of business operations. Given the critical nature of the vulnerability, attackers could deploy malware, create persistent backdoors, or launch further attacks against connected systems. This is especially concerning for sectors with high security requirements such as finance, healthcare, and government agencies. Additionally, compromised routers could be leveraged as part of botnets for large-scale distributed denial-of-service (DDoS) attacks, impacting not only the victim organization but also broader internet infrastructure. The absence of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation in the European context where remote attacks are common.

Mitigation Recommendations

1. Immediate replacement or isolation of affected D-Link DIR823G 1.02B05 routers is recommended if no firmware update is available. 2. Network segmentation should be employed to isolate vulnerable routers from critical internal systems to limit potential lateral movement. 3. Monitor network traffic for unusual outbound connections or command-and-control activity that could indicate exploitation attempts. 4. Implement strict firewall rules to restrict inbound management access to the router from untrusted networks. 5. Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting command injection attempts on router management interfaces. 6. Regularly audit and inventory network devices to identify any instances of the affected router model. 7. Engage with D-Link support channels to obtain any forthcoming patches or advisories and apply updates promptly once available. 8. Educate network administrators about the risks of unmanaged or outdated network devices and enforce policies for timely updates and replacements.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-30T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef274

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/22/2025, 7:50:57 AM

Last updated: 2/7/2026, 6:54:08 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats