Description
A security flaw has been discovered in D-Link DIR-823X 250416. This vulnerability affects unknown code of the file /goform/set_ac_server of the component Web Management Interface. The manipulation of the argument ac_server results in os command injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-02-06
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The flaw allows an attacker to inject operating‑system commands through the ac_server parameter of the /goform/set_ac_server endpoint in the router’s web management interface. By supplying a specially crafted value, the attacker can cause the device to execute arbitrary shell commands, potentially leading to full compromise of the device, data exfiltration, or service disruption.

Affected Systems

The vulnerability affects D‑Link DIR‑823X routers running firmware version 250416. Any unit operating this firmware is susceptible if the web management interface is reachable from an untrusted network.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate impact and the EPSS score of less than 1 % reflects a very low but non‑zero exploitation likelihood. The vulnerability is not listed in CISA’s KEV catalog and a public exploit has been released, meaning attackers could mount the attack remotely by sending HTTP requests to the vulnerable endpoint. Successful exploitation requires only network access to the router’s management interface and does not need local privileges.

Generated by OpenCVE AI on April 17, 2026 at 22:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an updated firmware release that fixes the /goform/set_ac_server injection point.
  • Restrict access to the router’s web management interface to a trusted internal network or VPN only.
  • If possible, disable or block the /goform/set_ac_server URL to eliminate the attack surface.

Generated by OpenCVE AI on April 17, 2026 at 22:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-823x
Dlink dir-823x Firmware
CPEs cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-823x_firmware:250416:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-823x
Dlink dir-823x Firmware

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-823x
Vendors & Products D-link
D-link dir-823x

Fri, 06 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in D-Link DIR-823X 250416. This vulnerability affects unknown code of the file /goform/set_ac_server of the component Web Management Interface. The manipulation of the argument ac_server results in os command injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.
Title D-Link DIR-823X Web Management set_ac_server os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-823x
Dlink Dir-823x Dir-823x Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:27:15.277Z

Reserved: 2026-02-06T06:40:14.410Z

Link: CVE-2026-2063

cve-icon Vulnrichment

Updated: 2026-02-06T19:43:05.115Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T19:16:10.950

Modified: 2026-02-11T19:00:59.470

Link: CVE-2026-2063

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:45:29Z

Weaknesses