D-Link DNR-322L Download of Code Without Integrity Check Vulnerability (CVE-2022-40799)
D-Link DNR-322L contains a download of code without integrity check vulnerability that could allow an authenticated attacker to execute OS level commands on the device. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
A remote attacker, with a low-privilege account, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. Federal agencies are required to remediate by 2025-08-26 under CISA BOD 22-01.
This is a Software Vulnerability (CWE-494) (CWE-494) vulnerability in D-Link DNR-322L. Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device. Exploitation requires remote network access, low attack complexity, a low-privilege authenticated account, and no user interaction required.
Probably yes if any of these apply:
Active exploitation documented in the wild. Threat-research write-up: https://gitlab.com/lu-ka/cve-2022-40799
Manual remediation steps
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.