


Perceptive Security
SOC/SIEM Consultancy

A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_wifidog_settings. Executing …
Published:
17 januari 2026 om 23:00:00
Alert date:
18 januari 2026 om 17:01:38
Source:
nvd.nist.gov
Network Infrastructure, Mobile & IoT
A command injection vulnerability has been identified in D-Link DIR-823X router version 250416. The vulnerability affects the sub_412E7C function in the /goform/set_wifidog_settings file, where manipulation of the wd_enable argument can lead to command injection. The attack can be executed remotely and exploit code has been made publicly available. This poses a significant security risk to affected devices as attackers can potentially execute arbitrary commands on the router.
Technical details
Mitigation steps:
Affected products:
D-Link DIR-823X
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-1125
https://github.com/DavCloudz/cve/blob/main/D-link/DIR_823X/DIR-823X%20V250416%20Command%20Execution%20Vulnerability.md
https://vuldb.com/?ctiid.341717
https://vuldb.com/?id.341717
https://vuldb.com/?submit.734966
https://www.dlink.com/
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
