Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.
References
| Link | Resource |
|---|---|
| https://gitlab.com/lu-ka/cve-2022-40799 | Exploit Third Party Advisory |
| https://gitlab.com/lu-ka/cve-2022-40799 | Exploit Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-40799 | |
| https://www.dlink.com/uk/en/products/dnr-322l-cloud-network-video-recorder | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
22 Oct 2025, 00:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
06 Aug 2025, 20:42
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.dlink.com/uk/en/products/dnr-322l-cloud-network-video-recorder - Product |
05 Aug 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2022-11-29 05:15
Updated : 2025-10-22 00:18
NVD link : CVE-2022-40799
Mitre link : CVE-2022-40799
CVE.ORG link : CVE-2022-40799
JSON object : View
Products Affected
dlink
- dnr-322l
- dnr-322l_firmware
CWE
CWE-494
Download of Code Without Integrity Check
