Description
A vulnerability was identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_40AC74 of the component Login. Such manipulation leads to improper restriction of excessive authentication attempts. The attack may be performed from remote. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used.
Published: 2026-01-30
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Excessive authentication allowed, exposing router to brute‑force attacks
Action: Patch ASAP
AI Analysis

Impact

The vulnerability arises from the sub_40AC74 function in the Login component of the D‑Link DIR‑823X. The code fails to impose the intended limit on repeated authentication attempts, so an attacker can send unlimited login requests. This flaw can be used for brute‑force credential enumeration and possibly for credential stuffing attacks. The description indicates that the attack requires high complexity and is considered difficult, but the exploit is publicly available.

Affected Systems

Affected devices are the D‑Link DIR‑823X routers running firmware version 250416. The issue was reported to affect the firmware build identified by the CPE string for dir‑823x_firmware:250416. No other versions or vendor products are specified.

Risk and Exploitability

The CVSS base score of 6.3 classifies the vulnerability as medium severity. The EPSS is less than 1 %, suggesting that, at present, the likelihood of exploitation is low. The vulnerability is not listed in CISA’s KEV catalog. The listed attack vector is remote; the attacker exploits the flaw against the router’s web interface. Although the exploit is public, the description notes that the attack has high complexity and is difficult to carry out, which may deter casual adversaries.

Generated by OpenCVE AI on April 18, 2026 at 01:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update that corrects the authentication limitation flaw.
  • If an update is not immediately available, block remote access to the router’s management interface from untrusted networks using firewall rules or VPN only.
  • Implement network‑level IP whitelisting and enforce account lockout or rate‑limiting policies in any additional authentication solutions to reduce brute‑force exposure.

Generated by OpenCVE AI on April 18, 2026 at 01:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-823x
Dlink dir-823x Firmware
CPEs cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-823x_firmware:250416:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-823x
Dlink dir-823x Firmware

Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-823x
Vendors & Products D-link
D-link dir-823x

Fri, 30 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_40AC74 of the component Login. Such manipulation leads to improper restriction of excessive authentication attempts. The attack may be performed from remote. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used.
Title D-Link DIR-823X Login sub_40AC74 excessive authentication
Weaknesses CWE-307
CWE-799
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.7, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-823x
Dlink Dir-823x Dir-823x Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:08:58.947Z

Reserved: 2026-01-30T07:40:40.236Z

Link: CVE-2026-1685

cve-icon Vulnrichment

Updated: 2026-01-30T14:55:38.484Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-30T15:16:08.973

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1685

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:15:05Z

Weaknesses