Severity
7.3HIGH
EPSS
0.1%
top 70.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 8

Description

A vulnerability was found in D-Link DIR-823X 250416. Affected by this issue is some unknown functionality of the file /goform/set_ac_status. Performing a manipulation of the argument ac_ipaddr/ac_ipstatus/ap_randtime results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5d-link/dir-823x250416

🔴Vulnerability Details

2
CVEList
D-Link DIR-823X set_ac_status os command injection2026-02-08
GHSA
GHSA-9cgv-px49-jxx3: A vulnerability was found in D-Link DIR-823X 2504162026-02-08
CVE-2026-2129 (HIGH CVSS 7.3) | A vulnerability was found in D-Link | cvebase.io