CVE-2025-10634

Severity
5.3MEDIUM
EPSS
0.1%
top 74.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18

Description

A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5d-link/dir-823x240126, 240802, 250416+2
NVDdlink/dir-823x_firmware240126, 240802, 250416+2

🔴Vulnerability Details

2
CVEList
D-Link DIR-823X Environment Variable goahead sub_412E7C command injection2025-09-18
GHSA
GHSA-hq6r-hhqx-wvqf: A weakness has been identified in D-Link DIR-823X 240126/240802/2504162025-09-18

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS D-Link set_server_settings Multiple Parameters Command Injection Attempt (CVE-2025-10634)2025-09-18
CVE-2025-10634 (MEDIUM CVSS 5.3) | A weakness has been identified in D | cvebase.io