Description
A vulnerability was determined in D-Link DIR-823X 250416. The affected element is an unknown function of the file /goform/set_password. This manipulation of the argument http_passwd causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-02-07
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution via OS Command Injection
Action: Immediate Patch
AI Analysis

Impact

A vulnerability in the DIR-823X router's management interface allows remote attackers to execute arbitrary operating system commands via the /goform/set_password endpoint. By manipulating the http_passwd parameter, an attacker can inject shell commands. The flaw is an OS command injection problem (CWE-77) that can lead to remote code execution, compromising confidentiality, integrity, and availability of the device and the network it serves.

Affected Systems

The issue affects D-Link DIR-823X routers running firmware version 250416. The vulnerable functionality resides in the undocumented /goform/set_password handler. All devices with this firmware revision are susceptible; no fixed version is listed in the data.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can reach the vulnerable interface over the network, making the exploit possible remotely if the router is exposed to the internet or an untrusted local network. While no specific commercial exploit is documented, the publicly disclosed nature of the vulnerability means that attackers could craft custom payloads.

Generated by OpenCVE AI on April 17, 2026 at 22:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to the latest firmware released by D-Link that addresses the command injection flaw in the set_password endpoint.
  • Restrict remote management access by configuring firewall rules or VPN to limit the IP addresses allowed to reach the router's web interface, thereby reducing the exposure of the vulnerable endpoint.
  • If a firmware update is unavailable, disable or block the /goform/set_password function through the router's access control settings, or implement input validation to reject non-alphanumeric characters in the http_passwd parameter to reduce the risk of command injection.
  • Enable logging for authentication and configuration changes and monitor for suspicious password alterations or unexpected command execution attempts.

Generated by OpenCVE AI on April 17, 2026 at 22:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink dir-823x Firmware
CPEs cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-823x_firmware:250416:*:*:*:*:*:*:*
Vendors & Products Dlink dir-823x Firmware

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-823x
Dlink
Dlink dir-823x
Vendors & Products D-link
D-link dir-823x
Dlink
Dlink dir-823x

Sat, 07 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in D-Link DIR-823X 250416. The affected element is an unknown function of the file /goform/set_password. This manipulation of the argument http_passwd causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
Title D-Link DIR-823X set_password os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-823x
Dlink Dir-823x Dir-823x Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:31:01.164Z

Reserved: 2026-02-06T08:07:39.800Z

Link: CVE-2026-2081

cve-icon Vulnrichment

Updated: 2026-02-10T15:40:22.976Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-07T10:15:52.170

Modified: 2026-02-10T14:57:10.863

Link: CVE-2026-2081

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:15:29Z

Weaknesses