Impact
The vulnerability is a command injection flaw that permits an attacker with authorized access to send a POST request to /goform/set_prohibiting on the device. This action injects arbitrary shell commands, granting the attacker full control over system processes and data. The weakness aligns with CWE‑77, indicating that unsanitized command execution is possible. The impact is a loss of confidentiality, integrity, and availability for the affected device.
Affected Systems
D‑Link DIR‑823X routers running firmware 240126 and 240802 are affected. The flaw is present in the firmware packages listed by CPE identifiers for the 240126 and 240802 revisions.
Risk and Exploitability
The CVSS score reflects a high severity of 7.2, and the EPSS score of 54% indicates a high probability that exploitation could occur in the wild. The vulnerability is listed in the CISA KEV catalog, confirming that it has been actively exploited. Based on the description, the likely attack vector is a remote attacker who can authenticate or has inherited credentials to the router, then issues the vulnerable POST request—therefore the exploitation requires remote network access and privileged or default credentials.
OpenCVE Enrichment
EUVD