Description
A vulnerability was identified in D-Link DIR-823X 250416. This affects an unknown function of the file /goform/set_server_settings of the component Configuration Parameter Handler. The manipulation of the argument terminal_addr/server_ip/server_port leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
Published: 2026-02-08
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

A remote attacker can manipulate the terminal_addr, server_ip, or server_port parameters of the /goform/set_server_settings configuration page to inject operating system commands. This leads to arbitrary command execution on the device, compromising the confidentiality, integrity, and availability of the router and the network it serves. The vulnerability arises from a failure to sanitize user input before passing it to the underlying operating system, classified under CWE‑77 and CWE‑78.

Affected Systems

The flaw affects D‑Link DIR‑823X routers running firmware version 250416. Any device in the DIR‑823X family that has not applied the vendor’s update for this firmware version remains vulnerable.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity, while the EPSS value of less than 1% suggests that exploitation is currently rare. The vulnerability can be triggered over the network from a remote host, and publicly documented exploit code exists. The lack of a KEV listing implies it has not yet been identified as a widely observed exploited vulnerability, but the high impact warrants pre‑emptive action.

Generated by OpenCVE AI on April 17, 2026 at 22:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the firmware update released by D‑Link that fixes the /goform/set_server_settings command injection flaw.
  • Disable or block access to the set_server_settings configuration endpoint if an update is unavailable, restricting remote modification of network settings.
  • Change the default administrative credentials and enforce a strong password policy to prevent unauthorized use of the configuration interface.
  • Monitor router logs for anomalous command execution attempts and enforce network segmentation to limit the blast radius of a potential compromise.

Generated by OpenCVE AI on April 17, 2026 at 22:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-823x
Dlink dir-823x Firmware
CPEs cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-823x_firmware:250416:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-823x
Dlink dir-823x Firmware

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-823x
Vendors & Products D-link
D-link dir-823x

Sun, 08 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in D-Link DIR-823X 250416. This affects an unknown function of the file /goform/set_server_settings of the component Configuration Parameter Handler. The manipulation of the argument terminal_addr/server_ip/server_port leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
Title D-Link DIR-823X Configuration Parameter set_server_settings os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-823x
Dlink Dir-823x Dir-823x Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:36:13.546Z

Reserved: 2026-02-06T14:46:38.967Z

Link: CVE-2026-2120

cve-icon Vulnrichment

Updated: 2026-02-10T19:34:29.540Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T01:16:09.990

Modified: 2026-02-11T18:59:38.843

Link: CVE-2026-2120

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:15:29Z

Weaknesses