Impact
The vulnerability exposes improper access controls in a large set of device configuration functions, including UpdateClientInfo. An attacker with remote access can manipulate those functions, potentially changing network settings such as firewall rules, LAN/WAN configurations, or the device domain name. This could allow the attacker to reroute traffic, disable security features, or otherwise disrupt the device’s operation. The weakness is an improper access control that permits privileged operations without proper authentication or authorization checks.
Affected Systems
The flaw is present only in the D‑Link DIR‑823G model running firmware version 1.0.2B05. This firmware is no longer supported by the vendor, meaning that no official security patches or updates are likely to be released. The device may still be in use in some networks but does not have active vendor support.
Risk and Exploitability
With a CVSS score of 6.9 the vulnerability is considered moderate, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. It is not listed in the CISA KEV catalog, but the attack can be launched remotely and has been publicly disclosed. Because the device is unsupported, attackers who still have connectivity to it can exploit the access control flaw to alter configuration, potentially leading to denial of service or compromise of network traffic.
OpenCVE Enrichment