Vulnerabilities (CVE)

Filtered by vendor Dlink Subscribe
Filtered by product Dir-823x
Total 36 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2026-2063 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-11 5.8 MEDIUM 4.7 MEDIUM
A security flaw has been discovered in D-Link DIR-823X 250416. This vulnerability affects unknown code of the file /goform/set_ac_server of the component Web Management Interface. The manipulation of the argument ac_server results in os command injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.
CVE-2026-2120 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-11 8.3 HIGH 7.2 HIGH
A vulnerability was identified in D-Link DIR-823X 250416. This affects an unknown function of the file /goform/set_server_settings of the component Configuration Parameter Handler. The manipulation of the argument terminal_addr/server_ip/server_port leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
CVE-2026-2129 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-11 8.3 HIGH 7.2 HIGH
A vulnerability was found in D-Link DIR-823X 250416. Affected by this issue is some unknown functionality of the file /goform/set_ac_status. Performing a manipulation of the argument ac_ipaddr/ac_ipstatus/ap_randtime results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.
CVE-2026-2155 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-11 8.3 HIGH 7.2 HIGH
A security flaw has been discovered in D-Link DIR-823X 250416. The affected element is the function sub_4208A0 of the file /goform/set_dmz of the component Configuration Handler. The manipulation of the argument dmz_host/dmz_enable results in os command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
CVE-2026-2157 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-11 8.3 HIGH 7.2 HIGH
A security vulnerability has been detected in D-Link DIR-823X 250416. This affects the function sub_4175CC of the file /goform/set_static_route_table. Such manipulation of the argument interface/destip/netmask/gateway/metric leads to os command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
CVE-2026-2175 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-11 8.3 HIGH 7.2 HIGH
A weakness has been identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_420618 of the file /goform/set_upnp. This manipulation of the argument upnp_enable causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
CVE-2026-2210 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-11 8.3 HIGH 7.2 HIGH
A vulnerability has been found in D-Link DIR-823X 250416. This affects the function sub_4211C8 of the file /goform/set_filtering. Such manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2026-2143 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-10 8.3 HIGH 7.2 HIGH
A security vulnerability has been detected in D-Link DIR-823X 250416. This issue affects some unknown processing of the file /goform/set_ddns of the component DDNS Service. The manipulation of the argument ddnsType/ddnsDomainName/ddnsUserName/ddnsPwd leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
CVE-2026-2142 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-10 8.3 HIGH 7.2 HIGH
A weakness has been identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_420688 of the file /goform/set_qos. Executing a manipulation can lead to os command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
CVE-2026-2084 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-10 8.3 HIGH 7.2 HIGH
A weakness has been identified in D-Link DIR-823X 250416. This impacts an unknown function of the file /goform/set_language. Executing a manipulation of the argument langSelection can lead to os command injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
CVE-2026-2082 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-10 5.8 MEDIUM 4.7 MEDIUM
A vulnerability was identified in D-Link DIR-823X 250416. The impacted element is an unknown function of the file /goform/set_mac_clone. Such manipulation of the argument mac leads to os command injection. The attack may be performed from remote. The exploit is publicly available and might be used.
CVE-2026-2081 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-10 5.8 MEDIUM 4.7 MEDIUM
A vulnerability was determined in D-Link DIR-823X 250416. The affected element is an unknown function of the file /goform/set_password. This manipulation of the argument http_passwd causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
CVE-2026-1544 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-02-09 6.5 MEDIUM 6.3 MEDIUM
A security flaw has been discovered in D-Link DIR-823X 250416. Impacted is the function sub_41E2A0 of the file /goform/set_mode. Performing a manipulation of the argument lan_gateway results in os command injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-1125 1 Dlink 2 Dir-823x, Dir-823x Firmware 2026-01-30 7.5 HIGH 7.3 HIGH
A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_wifidog_settings. Executing a manipulation of the argument wd_enable can lead to command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
CVE-2025-55848 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-03 N/A 8.8 HIGH
An issue was discovered in DIR-823 firmware 20250416. There is an RCE vulnerability in the set_cassword settings interface, as the http_casswd parameter is not filtered by '&'to allow injection of reverse connection commands.
CVE-2025-11092 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-02 6.5 MEDIUM 6.3 MEDIUM
A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_switch_settings. This manipulation of the argument port causes command injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
CVE-2025-11095 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-02 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was detected in D-Link DIR-823X 250416. This vulnerability affects unknown code of the file /goform/delete_offline_device. Performing manipulation of the argument delvalue results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
CVE-2025-11096 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-02 6.5 MEDIUM 6.3 MEDIUM
A flaw has been found in D-Link DIR-823X 250416. This issue affects some unknown processing of the file /goform/diag_traceroute. Executing manipulation of the argument target_addr can lead to command injection. The attack can be executed remotely. The exploit has been published and may be used.
CVE-2025-11097 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-02 6.5 MEDIUM 6.3 MEDIUM
A vulnerability has been found in D-Link DIR-823X 250416. Impacted is an unknown function of the file /goform/set_device_name. The manipulation of the argument mac leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-11098 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-02 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in D-Link DIR-823X 250416. The affected element is an unknown function of the file /goform/set_wifi_blacklists. The manipulation of the argument macList results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.