Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.
References
Link | Resource |
---|---|
https://gitlab.com/lu-ka/cve-2022-40799 | Exploit Third Party Advisory |
https://gitlab.com/lu-ka/cve-2022-40799 | Exploit Third Party Advisory |
https://www.dlink.com/uk/en/products/dnr-322l-cloud-network-video-recorder | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
06 Aug 2025, 20:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.dlink.com/uk/en/products/dnr-322l-cloud-network-video-recorder - Product |
05 Aug 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Nov 2024, 07:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.com/lu-ka/cve-2022-40799 - Exploit, Third Party Advisory |
Information
Published : 2022-11-29 05:15
Updated : 2025-08-06 20:42
NVD link : CVE-2022-40799
Mitre link : CVE-2022-40799
CVE.ORG link : CVE-2022-40799
JSON object : View
Products Affected
dlink
- dnr-322l
- dnr-322l_firmware
CWE
CWE-494
Download of Code Without Integrity Check