Back to list

D-Link DNR-322L Download of Code Without Integrity Check Vulnerability — CVE-2022-40799

Date
Source
CVE
Vendor
D-Link
Threat
high
CVSS
0
Exploited
Yes

Summary

Advisory CVE-2022-40799. D-Link DNR-322L Download of Code Without Integrity Check Vulnerability Vendor: D-Link. Source: CVE. Threat: high. CVSS 0. Known exploited in the wild. See the official advisory for details.

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Check logs/telemetry for indicators of compromise and suspicious activity.
  • Consider temporary hardening: restrict access, reduce attack surface, and monitor aggressively.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Read the official source

Related advisories