Skip to main content

CVE-2022-44801: n/a in n/a

Critical
VulnerabilityCVE-2022-44801cvecve-2022-44801
Published: Tue Nov 22 2022 (11/22/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

D-Link DIR-878 1.02B05 is vulnerable to Incorrect Access Control.

AI-Powered Analysis

AILast updated: 06/22/2025, 13:51:10 UTC

Technical Analysis

CVE-2022-44801 is a critical security vulnerability identified in the D-Link DIR-878 router, specifically version 1.02B05. The vulnerability is classified as an Incorrect Access Control flaw, which means that the device improperly restricts access to certain resources or functions, allowing unauthorized users to perform actions that should be restricted. The CVSS v3.1 base score of 9.8 indicates a critical severity level, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality (C:H), integrity (I:H), and availability (A:H) is high, meaning exploitation can lead to full compromise of the device. Since the vulnerability is remotely exploitable without authentication or user interaction, an attacker can potentially take full control over the router, intercept or manipulate network traffic, disrupt network availability, or use the device as a foothold for further attacks within the network. Although no known exploits are currently reported in the wild, the high CVSS score and the nature of the vulnerability make it a significant risk. The lack of vendor or patch information in the provided data suggests that mitigation may require manual intervention or vendor engagement. The D-Link DIR-878 is a consumer and small office/home office (SOHO) router model, commonly used to provide internet connectivity and network routing functions. Incorrect Access Control vulnerabilities in such devices can lead to severe network security breaches, including unauthorized configuration changes, exposure of sensitive data, and denial of service conditions.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on the D-Link DIR-878 router, this vulnerability poses a substantial risk. Exploitation could allow attackers to gain unauthorized access to internal networks, leading to data breaches, interception of confidential communications, and disruption of business operations. The high impact on confidentiality, integrity, and availability means that sensitive corporate data could be exposed or altered, and network services could be rendered unavailable. Additionally, compromised routers can be leveraged as pivot points for lateral movement within corporate networks or as part of botnets for broader attacks. Given the remote exploitability without authentication, attackers can scan for vulnerable devices across the internet, increasing the risk of widespread compromise. This is particularly concerning for organizations with limited IT security resources or those that do not regularly update or audit their network infrastructure. The absence of known exploits in the wild currently provides a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

Immediately verify if your organization uses the D-Link DIR-878 router, specifically version 1.02B05, or any variant potentially affected by this vulnerability. Contact D-Link support or check official vendor channels for firmware updates or patches addressing CVE-2022-44801. If no patch is available, consider upgrading to a newer, supported router model with confirmed security updates. Implement network segmentation to isolate vulnerable routers from critical internal systems, minimizing potential lateral movement in case of compromise. Restrict remote management access to the router by disabling WAN-side administration interfaces and limiting access to trusted IP addresses only. Monitor network traffic for unusual patterns indicative of exploitation attempts, such as unexpected configuration changes or unauthorized access attempts. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. Educate users and IT staff about the risks associated with outdated router firmware and the importance of timely updates and secure configuration practices. Consider replacing vulnerable routers with devices from vendors that provide timely security updates and have a strong security track record. If immediate patching is not feasible, implement compensating controls such as firewall rules to block known attack vectors or scanning activity targeting the router's management interfaces.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-07T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee88a

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/22/2025, 1:51:10 PM

Last updated: 8/15/2025, 4:20:45 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats