Description
A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_wifidog_settings. Executing a manipulation of the argument wd_enable can lead to command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
Problem types
Product status
Timeline
| 2026-01-17: | Advisory disclosed |
| 2026-01-17: | VulDB entry created |
| 2026-01-31: | VulDB entry last update |
Credits
Yun Zhang (VulDB User)
References
vuldb.com/?id.341717 (VDB-341717 | D-Link DIR-823X set_wifidog_settings sub_412E7C command injection)
vuldb.com/?ctiid.341717 (VDB-341717 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.734966 (Submit #734966 | D-Link DIR-823X Router V250416 Command Execution)
vuldb.com/?submit.743503 (Submit #743503 | D-Link DIR-823X 250416 OS Command Injection (Duplicate))
github.com/...23X V250416 Command Execution Vulnerability.md
www.dlink.com/