CVE-2025-10123: Command Injection in D-Link DIR-823X
A vulnerability was determined in D-Link DIR-823X up to 250416. Affected by this vulnerability is the function sub_415028 of the file /goform/set_static_leases. Executing manipulation of the argument Hostname can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-10123 is a command injection vulnerability identified in the D-Link DIR-823X router, specifically affecting firmware version 250416 and earlier. The vulnerability resides in the function sub_415028 within the /goform/set_static_leases endpoint. This function processes the Hostname argument, which can be manipulated by an attacker to inject arbitrary commands. Because the vulnerability can be exploited remotely without any authentication or user interaction, it poses a significant risk. The attacker can craft malicious requests to the vulnerable endpoint, leading to execution of arbitrary commands on the device with the privileges of the web server process. This could allow attackers to compromise the router, potentially gaining control over network traffic, modifying configurations, or pivoting to other devices on the network. The CVSS 4.0 score is 6.9 (medium severity), reflecting the ease of remote exploitation without authentication, but with limited impact on confidentiality, integrity, and availability (all rated low). The vulnerability has been publicly disclosed, but no known exploits in the wild have been reported yet. However, public disclosure increases the risk of exploitation attempts. The lack of available patches at the time of reporting further elevates the urgency for mitigation. Given the router’s role as a network gateway device, exploitation could have serious consequences for network security and privacy.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized control over network infrastructure if the vulnerable D-Link DIR-823X routers are deployed. Compromise of these routers could allow attackers to intercept, modify, or redirect network traffic, potentially exposing sensitive data or enabling further attacks within corporate or home networks. Small and medium enterprises (SMEs) and home users relying on this router model are particularly at risk, as they may lack robust network monitoring or segmentation. The impact on confidentiality is moderate due to possible data interception, while integrity and availability impacts are low to moderate depending on attacker goals. The vulnerability’s remote, unauthenticated nature increases the risk of widespread exploitation, especially in environments where firmware updates are not regularly applied. For organizations subject to GDPR and other data protection regulations, exploitation could lead to data breaches and regulatory penalties. Additionally, compromised routers could be leveraged as part of botnets or for launching attacks on other targets, amplifying the threat landscape in Europe.
Mitigation Recommendations
1. Immediate mitigation should focus on isolating vulnerable D-Link DIR-823X devices from critical network segments to limit potential damage. 2. Network administrators should monitor network traffic for unusual activity originating from or targeting these routers, including unexpected outbound connections or command injection patterns. 3. Since no official patches are currently available, organizations should contact D-Link support for any interim firmware updates or advisories. 4. Consider replacing vulnerable devices with models confirmed to be free from this vulnerability or from vendors with timely patching practices. 5. Implement network-level protections such as firewall rules to restrict access to the router’s management interface, especially from untrusted networks. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting the /goform/set_static_leases endpoint. 7. Educate users and administrators about the risks and signs of router compromise to enable rapid response. 8. Regularly audit and update router firmware as soon as patches become available to remediate the vulnerability definitively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-10123: Command Injection in D-Link DIR-823X
Description
A vulnerability was determined in D-Link DIR-823X up to 250416. Affected by this vulnerability is the function sub_415028 of the file /goform/set_static_leases. Executing manipulation of the argument Hostname can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-10123 is a command injection vulnerability identified in the D-Link DIR-823X router, specifically affecting firmware version 250416 and earlier. The vulnerability resides in the function sub_415028 within the /goform/set_static_leases endpoint. This function processes the Hostname argument, which can be manipulated by an attacker to inject arbitrary commands. Because the vulnerability can be exploited remotely without any authentication or user interaction, it poses a significant risk. The attacker can craft malicious requests to the vulnerable endpoint, leading to execution of arbitrary commands on the device with the privileges of the web server process. This could allow attackers to compromise the router, potentially gaining control over network traffic, modifying configurations, or pivoting to other devices on the network. The CVSS 4.0 score is 6.9 (medium severity), reflecting the ease of remote exploitation without authentication, but with limited impact on confidentiality, integrity, and availability (all rated low). The vulnerability has been publicly disclosed, but no known exploits in the wild have been reported yet. However, public disclosure increases the risk of exploitation attempts. The lack of available patches at the time of reporting further elevates the urgency for mitigation. Given the router’s role as a network gateway device, exploitation could have serious consequences for network security and privacy.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized control over network infrastructure if the vulnerable D-Link DIR-823X routers are deployed. Compromise of these routers could allow attackers to intercept, modify, or redirect network traffic, potentially exposing sensitive data or enabling further attacks within corporate or home networks. Small and medium enterprises (SMEs) and home users relying on this router model are particularly at risk, as they may lack robust network monitoring or segmentation. The impact on confidentiality is moderate due to possible data interception, while integrity and availability impacts are low to moderate depending on attacker goals. The vulnerability’s remote, unauthenticated nature increases the risk of widespread exploitation, especially in environments where firmware updates are not regularly applied. For organizations subject to GDPR and other data protection regulations, exploitation could lead to data breaches and regulatory penalties. Additionally, compromised routers could be leveraged as part of botnets or for launching attacks on other targets, amplifying the threat landscape in Europe.
Mitigation Recommendations
1. Immediate mitigation should focus on isolating vulnerable D-Link DIR-823X devices from critical network segments to limit potential damage. 2. Network administrators should monitor network traffic for unusual activity originating from or targeting these routers, including unexpected outbound connections or command injection patterns. 3. Since no official patches are currently available, organizations should contact D-Link support for any interim firmware updates or advisories. 4. Consider replacing vulnerable devices with models confirmed to be free from this vulnerability or from vendors with timely patching practices. 5. Implement network-level protections such as firewall rules to restrict access to the router’s management interface, especially from untrusted networks. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting the /goform/set_static_leases endpoint. 7. Educate users and administrators about the risks and signs of router compromise to enable rapid response. 8. Regularly audit and update router firmware as soon as patches become available to remediate the vulnerability definitively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-08T15:19:14.461Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bf9505d5a2966cfc85b35b
Added to database: 9/9/2025, 2:46:29 AM
Last enriched: 9/9/2025, 3:01:25 AM
Last updated: 9/9/2025, 8:15:38 AM
Views: 10
Related Threats
CVE-2025-48208: CWE-90 Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') in Apache Software Foundation Apache HertzBeat (incubating)
HighCVE-2025-24404: CWE-91 XML Injection (aka Blind XPath Injection) in Apache Software Foundation Apache HertzBeat (incubating)
HighCVE-2025-59019: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 TYPO3 CMS
MediumCVE-2025-59018: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 TYPO3 CMS
HighCVE-2025-59017: CWE-862 Missing Authorization in TYPO3 TYPO3 CMS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.