#VU115714 Command Injection in DIR-823X - CVE-2025-10123
Published: September 17, 2025
Vulnerability identifier: #VU115714
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2025-10123
CWE-ID: CWE-77
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
DIR-823X
DIR-823X
Software vendor:
D-Link
D-Link
Description
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the sub_415028 function in the /goform/set_static_leases file. A remote attacker can pass specially crafted data to the application and execute arbitrary commands.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
External links
- https://github.com/lin-3-start/lin-cve/blob/main/DIR-823X/D-Link%20DIR-823X%20routers%20have%20an%20unauthorized%20command%20execution%20vulnerability.md
- https://github.com/lin-3-start/lin-cve/blob/main/DIR-823X/D-Link%20DIR-823X%20routers%20have%20an%20unauthorized%20command%20execution%20vulnerability.md#poc
- https://vuldb.com/?ctiid.323093
- https://vuldb.com/?id.323093
- https://vuldb.com/?submit.645712
- https://www.dlink.com/