Skip to main content

CVE-2025-11095: Command Injection in D-Link DIR-823X

Medium
VulnerabilityCVE-2025-11095cvecve-2025-11095
Published: Sun Sep 28 2025 (09/28/2025, 04:02:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-823X

Description

A vulnerability was detected in D-Link DIR-823X 250416. This vulnerability affects unknown code of the file /goform/delete_offline_device. Performing manipulation of the argument delvalue results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/29/2025, 00:11:23 UTC

Technical Analysis

CVE-2025-11095 is a command injection vulnerability identified in the D-Link DIR-823X router, specifically affecting firmware version 250416. The vulnerability resides in the handling of the /goform/delete_offline_device endpoint, where manipulation of the 'delvalue' argument allows an attacker to inject arbitrary commands. This flaw enables remote exploitation without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts the confidentiality, integrity, and availability of the affected device by potentially allowing an attacker to execute arbitrary commands with elevated privileges, leading to unauthorized control over the router. Although the CVSS score is medium (5.3), the presence of a public exploit increases the risk of exploitation. The vulnerability does not require user interaction and has low attack complexity, but it does require some level of privileges (PR:L), suggesting that the attacker might need limited access or be on the local network or have some form of authenticated access. The lack of patch links suggests that no official fix has been released at the time of publication, increasing the urgency for mitigation. The router’s role as a network gateway means exploitation could facilitate further attacks on connected devices or network traffic interception.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to significant network security breaches. Compromised routers can serve as entry points for attackers to infiltrate corporate networks, intercept sensitive communications, or launch lateral movement attacks. Given the widespread use of D-Link routers in small to medium enterprises and home office environments across Europe, the risk extends to both corporate and remote work infrastructures. Attackers could disrupt business operations by altering network configurations, causing denial of service, or deploying malware. The vulnerability's ability to execute arbitrary commands remotely could also enable attackers to establish persistent access or exfiltrate confidential data. This is particularly critical for sectors with stringent data protection requirements under GDPR, as breaches could lead to regulatory penalties and reputational damage. Additionally, the lack of a patch at the time of disclosure means organizations must rely on alternative mitigations, increasing exposure duration.

Mitigation Recommendations

Organizations should immediately inventory their network devices to identify any D-Link DIR-823X routers running firmware version 250416. Until an official patch is released, it is crucial to restrict access to the router’s management interfaces by implementing network segmentation and firewall rules that limit access to trusted IP addresses only. Disabling remote management features and ensuring that management interfaces are not exposed to the internet can reduce the attack surface. Network administrators should monitor router logs for suspicious activity related to the /goform/delete_offline_device endpoint and unusual command executions. Employing intrusion detection/prevention systems (IDS/IPS) with signatures targeting this exploit can provide additional defense. Where possible, replacing vulnerable routers with updated models or alternative devices with active security support is advisable. Organizations should also educate users about the risks and encourage prompt reporting of network anomalies. Finally, maintaining regular backups of router configurations can facilitate recovery if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-27T08:17:37.003Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d9ce3549cfd472f579504f

Added to database: 9/29/2025, 12:09:25 AM

Last enriched: 9/29/2025, 12:11:23 AM

Last updated: 9/29/2025, 12:48:09 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats