{"vulnerability": "cve-2022-40282", "sightings": [{"uuid": "0b7333c8-8a86-4eb2-ac1d-f8767b08843a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40282", "type": "seen", "source": "https://t.me/cibsecurity/53489", "content": "\u203c CVE-2022-40282 \u203c\n\nThe web server of Hirschmann BAT-C2 before 09.13.01.00R04 allows authenticated command injection. This allows an authenticated attacker to pass commands to the shell of the system because the dir parameter of the FsCreateDir Ajax function is not sufficiently sanitized. The vendor's ID is BSECV-2022-21.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-25T07:15:13.000000Z"}, {"uuid": "8a8dff4c-a1c7-4606-817e-222baea258d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40282", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13837", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-40282\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The web server of Hirschmann BAT-C2 before 09.13.01.00R04 allows authenticated command injection. This allows an authenticated attacker to pass commands to the shell of the system because the dir parameter of the FsCreateDir Ajax function is not sufficiently sanitized. The vendor's ID is BSECV-2022-21.\n\ud83d\udccf Published: 2022-11-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T14:54:42.736Z\n\ud83d\udd17 References:\n1. https://www.belden.com/support/security-assurance\n2. http://seclists.org/fulldisclosure/2022/Nov/19\n3. http://packetstormsecurity.com/files/170063/Hirschmann-Belden-BAT-C2-8.8.1.0R8-Command-Injection.html", "creation_timestamp": "2025-04-29T15:11:44.000000Z"}]}