Description
A vulnerability has been found in D-Link DIR-823X 250416. This affects the function sub_4211C8 of the file /goform/set_filtering. Such manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-02-09
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS command injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the sub_4211C8 routine of the /goform/set_filtering endpoint on D‑Link DIR‑823X firmware 250416. Improper handling of the filtering parameters allows an attacker to inject arbitrary shell commands. An attacker who successfully exploits the flaw can execute any operating‑system commands with the privileges of the router’s firmware, potentially taking full control of the device and the network segment it monitors.

Affected Systems

The affected product is the D‑Link DIR‑823X router running firmware version 250416. No other versions or hardware revisions are listed as vulnerable in the current advisory.

Risk and Exploitability

The CVSS v3.1 score is 8.6, reflecting a high severity attack that can be carried out remotely with no authentication. However, the EPSS score is below 1%, indicating that, as of the latest data, the probability of exploitation is low. The vulnerability is not listed in the CISA KEV catalog, so no known public exploits are reported yet. Exploitation requires remote access to the router’s web administration interface and sufficient input to the set_filtering endpoint; no specialized hardware or local privileges are needed.

Generated by OpenCVE AI on April 17, 2026 at 21:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update released by D‑Link that addresses the command‑injection flaw in the set_filtering endpoint.
  • Limit exposure of the router’s administrative interface by restricting WAN access or placing the device on a separate VLAN with strict firewall rules.
  • Enable a strong administrator password and, if remote management is not required, disable it entirely to reduce the attack surface.

Generated by OpenCVE AI on April 17, 2026 at 21:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-823x
Dlink dir-823x Firmware
CPEs cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-823x_firmware:250416:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-823x
Dlink dir-823x Firmware

Mon, 09 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-823x
Vendors & Products D-link
D-link dir-823x

Mon, 09 Feb 2026 02:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in D-Link DIR-823X 250416. This affects the function sub_4211C8 of the file /goform/set_filtering. Such manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Title D-Link DIR-823X set_filtering sub_4211C8 os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-823x
Dlink Dir-823x Dir-823x Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:55:14.499Z

Reserved: 2026-02-08T08:09:02.482Z

Link: CVE-2026-2210

cve-icon Vulnrichment

Updated: 2026-02-09T16:41:18.362Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T03:16:13.970

Modified: 2026-02-11T18:36:24.947

Link: CVE-2026-2210

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses