CVE Alert: CVE-2022-40799 – n/a – n/a

CVE-2022-40799

UnknownCISA KEVExploitation active

Data Integrity Failure in ‘Backup Config’ in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.

CVSS v3.1 not provided
Vendor
n/a
Product
n/a
Versions
n/a
CWE
n/a
Vector
n a
Published
2022-11-29T00:00:00.000Z
Updated
2025-08-05T22:20:24.759Z

AI Summary Analysis

Risk verdict

Critical: the vulnerability is actively exploited and documented as a known exploited vulnerability; treat as priority 1.

Why this matters

Authenticated, low-privilege access over the network enables OS-level command execution, with full impact on confidentiality, integrity and availability. In SMB environments, an NVR breach can disrupt surveillance and potentially serve as a foothold to pivot toward other network assets.

Most likely attack path

Exploitation requires network access and authenticated credentials with low privileges; no user interaction is needed. Given the network vector and total impact, an attacker could execute commands directly on the device, gaining persistent control and potentially abusing the backup/config pathway to alter data integrity.

Who is most exposed

Commonly deployed in small to mid-sized businesses where NVRs sit on flat or lightly segmented networks with remote management enabled; weak authentication or misconfiguration increases exposure.

Detection ideas

  • Unusual OS-level command executions originating from the backup/config interface.
  • Changes to backup configuration or data integrity checks outside normal admin activity.
  • Privileged actions or shell access sequences from management interfaces.
  • Anomalous outbound traffic or C2-like destinations from the device.
  • Authentication attempts or successful logins from unfamiliar IPs or at atypical times.

Mitigation and prioritisation

  • Apply the vendor patch or firmware update; treat as priority 1.
  • If patching is not immediately possible: restrict network exposure (VPN-only access), disable remote management, and implement strict firewall rules isolating the NVR.
  • Enforce strong authentication and rotate credentials; consider MFA where available.
  • Segment the NVR from critical assets; monitor for anomalous management activity.
  • Plan and test patch deployment in a maintenance window; document changes and enable enhanced logging for post-geo-temporal correlation.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.