CVE-2022-38873
moderate-risk
Published 2022-12-20
D-Link devices DAP-2310 v2.10rc036 and earlier, DAP-2330 v1.06rc020 and earlier, DAP-2360 v2.10rc050 and earlier, DAP-2553 v3.10rc031 and earlier, DAP-2660 v1.15rc093 and earlier, DAP-2690 v3.20rc106 and earlier, DAP-2695 v1.20rc119_beta31 and earlier, DAP-3320 v1.05rc027 beta and earlier, DAP-3662 v1.05rc047 and earlier allows attackers to cause a Denial of Service (DoS) via uploading a crafted firmware after modifying the firmware header.
Do I need to act?
-
0.12% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (11)
Dap-2310 Firmware
Dap-2330 Firmware
Dap-2360 Firmware
Dap-2553 Firmware
Dap-2690 Firmware
Dap-2695 Firmware
Dap-2695 Firmware
Dap-3320 Firmware
Dap-3320 Firmware
Dap-3662 Firmware
Affected Vendors
References (4)
Vendor Advisory
https://www.dlink.com/en/security-bulletin/
Vendor Advisory
https://www.dlink.com/en/security-bulletin/
43
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
1/34 · Minimal
Exposure
16/34 · Moderate