CVE-2022-45182: n/a in n/a
Pi-Star_DV_Dash (for Pi-Star DV) before 5aa194d mishandles the module parameter.
AI Analysis
Technical Summary
CVE-2022-45182 is a critical vulnerability identified in Pi-Star_DV_Dash, a component related to Pi-Star DV, which is a digital voice hotspot software commonly used in amateur radio communications. The vulnerability arises from improper handling of the 'module' parameter before the commit 5aa194d. Specifically, this mishandling corresponds to a CWE-233 weakness, which relates to improper handling of external input leading to a potential denial of service or other impacts. The CVSS v3.1 score is 9.8, indicating a critical severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). This suggests that an unauthenticated attacker can remotely exploit this vulnerability without user interaction, potentially leading to full compromise of the affected system. Although no public exploits are currently known in the wild, the high CVSS score and the nature of the vulnerability imply that exploitation could allow attackers to execute arbitrary commands, disrupt services, or exfiltrate sensitive data. The lack of vendor and product details in the provided information limits precise identification, but the reference to Pi-Star_DV_Dash indicates the affected software is niche and specialized for digital voice communications in amateur radio contexts.
Potential Impact
For European organizations, especially those involved in amateur radio, emergency communications, or digital voice networks, this vulnerability poses a significant risk. Exploitation could lead to service outages, loss of communication capabilities, or unauthorized access to sensitive communication channels. Given the criticality and ease of exploitation, attackers could disrupt emergency response communications or intercept confidential transmissions. While the affected software is specialized, some European countries have active amateur radio communities and emergency communication networks that rely on Pi-Star DV hotspots. Disruption or compromise in these systems could degrade operational readiness and trust in communication infrastructure. Additionally, if these systems are integrated into broader organizational networks, the vulnerability could serve as a pivot point for further attacks.
Mitigation Recommendations
Organizations using Pi-Star DV or Pi-Star_DV_Dash should immediately verify their software version and update to the fixed version beyond commit 5aa194d where the module parameter handling is corrected. Since no patch links are provided, users should monitor official Pi-Star repositories or trusted community channels for updates. Network-level mitigations include restricting access to the affected services via firewall rules, limiting exposure to untrusted networks, and employing intrusion detection systems to monitor anomalous traffic targeting the module parameter. Additionally, organizations should conduct thorough audits of their digital voice communication infrastructure to identify any unauthorized access or anomalies. Implementing network segmentation to isolate these devices from critical infrastructure can reduce potential impact. Finally, raising awareness among amateur radio operators and emergency communication teams about this vulnerability is essential to ensure timely patching and risk reduction.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2022-45182: n/a in n/a
Description
Pi-Star_DV_Dash (for Pi-Star DV) before 5aa194d mishandles the module parameter.
AI-Powered Analysis
Technical Analysis
CVE-2022-45182 is a critical vulnerability identified in Pi-Star_DV_Dash, a component related to Pi-Star DV, which is a digital voice hotspot software commonly used in amateur radio communications. The vulnerability arises from improper handling of the 'module' parameter before the commit 5aa194d. Specifically, this mishandling corresponds to a CWE-233 weakness, which relates to improper handling of external input leading to a potential denial of service or other impacts. The CVSS v3.1 score is 9.8, indicating a critical severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). This suggests that an unauthenticated attacker can remotely exploit this vulnerability without user interaction, potentially leading to full compromise of the affected system. Although no public exploits are currently known in the wild, the high CVSS score and the nature of the vulnerability imply that exploitation could allow attackers to execute arbitrary commands, disrupt services, or exfiltrate sensitive data. The lack of vendor and product details in the provided information limits precise identification, but the reference to Pi-Star_DV_Dash indicates the affected software is niche and specialized for digital voice communications in amateur radio contexts.
Potential Impact
For European organizations, especially those involved in amateur radio, emergency communications, or digital voice networks, this vulnerability poses a significant risk. Exploitation could lead to service outages, loss of communication capabilities, or unauthorized access to sensitive communication channels. Given the criticality and ease of exploitation, attackers could disrupt emergency response communications or intercept confidential transmissions. While the affected software is specialized, some European countries have active amateur radio communities and emergency communication networks that rely on Pi-Star DV hotspots. Disruption or compromise in these systems could degrade operational readiness and trust in communication infrastructure. Additionally, if these systems are integrated into broader organizational networks, the vulnerability could serve as a pivot point for further attacks.
Mitigation Recommendations
Organizations using Pi-Star DV or Pi-Star_DV_Dash should immediately verify their software version and update to the fixed version beyond commit 5aa194d where the module parameter handling is corrected. Since no patch links are provided, users should monitor official Pi-Star repositories or trusted community channels for updates. Network-level mitigations include restricting access to the affected services via firewall rules, limiting exposure to untrusted networks, and employing intrusion detection systems to monitor anomalous traffic targeting the module parameter. Additionally, organizations should conduct thorough audits of their digital voice communication infrastructure to identify any unauthorized access or anomalies. Implementing network segmentation to isolate these devices from critical infrastructure can reduce potential impact. Finally, raising awareness among amateur radio operators and emergency communication teams about this vulnerability is essential to ensure timely patching and risk reduction.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-11-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9839c4522896dcbeceeb
Added to database: 5/21/2025, 9:09:13 AM
Last enriched: 7/2/2025, 2:41:14 AM
Last updated: 2/7/2026, 12:04:40 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.