CVE-2026-2175

A weakness has been identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_420618 of the file /goform/set_upnp. This manipulation of the argument upnp_enable causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
References
Link Resource
https://github.com/master-abc/cve/issues/31 Exploit Issue Tracking
https://vuldb.com/?ctiid.344876 Permissions Required VDB Entry
https://vuldb.com/?id.344876 Third Party Advisory VDB Entry
https://vuldb.com/?submit.749263 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-823x_firmware:250416:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*

History

11 Feb 2026, 18:38

Type Values Removed Values Added
CPE cpe:2.3:o:dlink:dir-823x_firmware:250416:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*
First Time Dlink dir-823x
Dlink dir-823x Firmware
Dlink
References () https://github.com/master-abc/cve/issues/31 - () https://github.com/master-abc/cve/issues/31 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.344876 - () https://vuldb.com/?ctiid.344876 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.344876 - () https://vuldb.com/?id.344876 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.749263 - () https://vuldb.com/?submit.749263 - Third Party Advisory, VDB Entry
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product

08 Feb 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-08 19:16

Updated : 2026-02-11 18:38


NVD link : CVE-2026-2175

Mitre link : CVE-2026-2175

CVE.ORG link : CVE-2026-2175


JSON object : View

Products Affected

dlink

  • dir-823x
  • dir-823x_firmware
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')