CVE-2022-37055

D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Buffer Overflow via cgibin, hnap_main,
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:go-rt-ac750_firmware:2.00b02:*:*:*:*:*:*:*
cpe:2.3:h:dlink:go-rt-ac750:revision_b:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:dlink:go-rt-ac750_firmware:1.01b03:*:*:*:*:*:*:*
cpe:2.3:h:dlink:go-rt-ac750:revision_a:*:*:*:*:*:*:*

History

09 Dec 2025, 19:15

Type Values Removed Values Added
CPE cpe:2.3:h:dlink:go-rt-ac750:-:*:*:*:*:*:*:* cpe:2.3:h:dlink:go-rt-ac750:revision_b:*:*:*:*:*:*:*
cpe:2.3:h:dlink:go-rt-ac750:revision_a:*:*:*:*:*:*:*

09 Dec 2025, 18:49

Type Values Removed Values Added
References () https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10308 - () https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10308 - Vendor Advisory
References () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-37055 - () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-37055 - US Government Resource
References () https://www.fortiguard.com/outbreak-alert/d-link-multiple-devices-attack - () https://www.fortiguard.com/outbreak-alert/d-link-multiple-devices-attack - Third Party Advisory
CPE cpe:2.3:o:dlink:go-rt-ac750_firmware:reva_1.01b03:*:*:*:*:*:*:*
cpe:2.3:o:dlink:go-rt-ac750_firmware:revb_2.00b02:*:*:*:*:*:*:*
cpe:2.3:o:dlink:go-rt-ac750_firmware:1.01b03:*:*:*:*:*:*:*
cpe:2.3:o:dlink:go-rt-ac750_firmware:2.00b02:*:*:*:*:*:*:*

08 Dec 2025, 19:15

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-37055 -
  • () https://www.fortiguard.com/outbreak-alert/d-link-multiple-devices-attack -

06 Jan 2025, 15:15

Type Values Removed Values Added
References
  • () https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10308 -

21 Nov 2024, 07:14

Type Values Removed Values Added
References () https://drive.google.com/file/d/1hmIk0jQoex4QDyjIUg_6yxi-J6ROCh8S/view?usp=sharing - Exploit, Patch, Third Party Advisory () https://drive.google.com/file/d/1hmIk0jQoex4QDyjIUg_6yxi-J6ROCh8S/view?usp=sharing - Exploit, Patch, Third Party Advisory
References () https://www.dlink.com/en/security-bulletin/ - Vendor Advisory () https://www.dlink.com/en/security-bulletin/ - Vendor Advisory

Information

Published : 2022-08-28 17:15

Updated : 2025-12-09 19:15


NVD link : CVE-2022-37055

Mitre link : CVE-2022-37055

CVE.ORG link : CVE-2022-37055


JSON object : View

Products Affected

dlink

  • go-rt-ac750
  • go-rt-ac750_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')