CVE-2022-4420122.11.2022, 15:15D-Link DIR823G 1.02B05 is vulnerable to Commad Injection.OS Command InjectionEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST9.8 CRITICALNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HmitreCNA------CVEADP------CISA-ADPADP9.8 CRITICALNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HBase ScoreCVSS 3.xEPSS ScorePercentile: 75%VendorProductVersiondlinkdir-823g_firmware1.02b05:b05𝑥= Vulnerable software versionsKnown Exploits!https://github.com/RobinWang825/IoT_vuln/blob/main/D-Link/DIR-823G/1/readme.mdhttps://github.com/RobinWang825/IoT_vuln/blob/main/D-Link/DIR-823G/1/readme.mdCommon Weakness EnumerationCWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Referenceshttps://github.com/RobinWang825/IoT_vuln/blob/main/D-Link/DIR-823G/1/readme.mdhttps://www.dlink.com/en/security-bulletin/https://github.com/RobinWang825/IoT_vuln/blob/main/D-Link/DIR-823G/1/readme.mdhttps://www.dlink.com/en/security-bulletin/