SB2025091756 - Multiple vulnerabilities in D-Link DIR-823X
Published: September 17, 2025 Updated: October 1, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Command Injection (CVE-ID: CVE-2025-10123)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the sub_415028 function in the /goform/set_static_leases file. A remote attacker can pass specially crafted data to the application and execute arbitrary commands.
2) Command Injection (CVE-ID: CVE-2025-10401)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation within an unknown function of the file /goform/diag_ping. A remote user can pass specially crafted data to the application and execute arbitrary commands.
3) Command Injection (CVE-ID: CVE-2025-11095)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the /goform/delete_offline_device file. A remote user can pass specially crafted data to the application and execute arbitrary commands.
4) Command Injection (CVE-ID: CVE-2025-11097)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the /goform/set_device_name file. A remote user can pass specially crafted data to the application and execute arbitrary commands.
5) Command Injection (CVE-ID: CVE-2025-11092)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the "sub_412E7C" function of the file /goform/set_switch_settings. A remote user can pass specially crafted data to the application and execute arbitrary commands.
6) Command Injection (CVE-ID: CVE-2025-10634)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the "sub_412E7C" function of the /usr/sbin/goahead file of the component Environment Variable Handler. A remote user can pass specially crafted data to the application and execute arbitrary commands.
7) Command Injection (CVE-ID: CVE-2025-10814)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the /usr/sbin/goahead file. A remote user can pass specially crafted data to the application and execute arbitrary commands.
8) Command Injection (CVE-ID: CVE-2025-11100)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the uci_set function of the file /goform/set_wifi_blacklists. A remote user can pass specially crafted data to the application and execute arbitrary commands.
9) Command Injection (CVE-ID: CVE-2025-11098)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the /goform/set_wifi_blacklists file. A remote user can pass specially crafted data to the application and execute arbitrary commands.
10) Command Injection (CVE-ID: CVE-2025-11096)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the /goform/diag_traceroute file. A remote user can pass specially crafted data to the application and execute arbitrary commands.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://github.com/lin-3-start/lin-cve/blob/main/DIR-823X/D-Link%20DIR-823X%20routers%20have%20an%20unauthorized%20command%20execution%20vulnerability.md
- https://github.com/lin-3-start/lin-cve/blob/main/DIR-823X/D-Link%20DIR-823X%20routers%20have%20an%20unauthorized%20command%20execution%20vulnerability.md#poc
- https://vuldb.com/?ctiid.323093
- https://vuldb.com/?id.323093
- https://vuldb.com/?submit.645712
- https://www.dlink.com/
- https://github.com/Cpppq43/D-Link/blob/main/D-Link%20DIR-823X%20AX3000.md
- https://vuldb.com/?ctiid.323836
- https://vuldb.com/?id.323836
- https://vuldb.com/?submit.646761
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10469