top of page
perceptive_background_267k.jpg

A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_wifidog_settings. Executing …

Published:

17 januari 2026 om 23:00:00

Alert date:

18 januari 2026 om 17:01:38

Source:

nvd.nist.gov

Click to open the original link from this advisory

Network Infrastructure, Mobile & IoT

A command injection vulnerability has been identified in D-Link DIR-823X router version 250416. The vulnerability affects the sub_412E7C function in the /goform/set_wifidog_settings file, where manipulation of the wd_enable argument can lead to command injection. The attack can be executed remotely and exploit code has been made publicly available. This poses a significant security risk to affected devices as attackers can potentially execute arbitrary commands on the router.

Technical details

Mitigation steps:

Affected products:

D-Link DIR-823X

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page