CVE-2025-11095: Command Injection in D-Link DIR-823X
A vulnerability was detected in D-Link DIR-823X 250416. This vulnerability affects unknown code of the file /goform/delete_offline_device. Performing manipulation of the argument delvalue results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-11095 is a command injection vulnerability identified in the D-Link DIR-823X router, specifically affecting firmware version 250416. The vulnerability resides in the handling of the /goform/delete_offline_device endpoint, where manipulation of the 'delvalue' argument allows an attacker to inject arbitrary commands. This flaw enables remote exploitation without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts the confidentiality, integrity, and availability of the affected device by potentially allowing an attacker to execute arbitrary commands with elevated privileges, leading to unauthorized control over the router. Although the CVSS score is medium (5.3), the presence of a public exploit increases the risk of exploitation. The vulnerability does not require user interaction and has low attack complexity, but it does require some level of privileges (PR:L), suggesting that the attacker might need limited access or be on the local network or have some form of authenticated access. The lack of patch links suggests that no official fix has been released at the time of publication, increasing the urgency for mitigation. The router’s role as a network gateway means exploitation could facilitate further attacks on connected devices or network traffic interception.
Potential Impact
For European organizations, the exploitation of this vulnerability could lead to significant network security breaches. Compromised routers can serve as entry points for attackers to infiltrate corporate networks, intercept sensitive communications, or launch lateral movement attacks. Given the widespread use of D-Link routers in small to medium enterprises and home office environments across Europe, the risk extends to both corporate and remote work infrastructures. Attackers could disrupt business operations by altering network configurations, causing denial of service, or deploying malware. The vulnerability's ability to execute arbitrary commands remotely could also enable attackers to establish persistent access or exfiltrate confidential data. This is particularly critical for sectors with stringent data protection requirements under GDPR, as breaches could lead to regulatory penalties and reputational damage. Additionally, the lack of a patch at the time of disclosure means organizations must rely on alternative mitigations, increasing exposure duration.
Mitigation Recommendations
Organizations should immediately inventory their network devices to identify any D-Link DIR-823X routers running firmware version 250416. Until an official patch is released, it is crucial to restrict access to the router’s management interfaces by implementing network segmentation and firewall rules that limit access to trusted IP addresses only. Disabling remote management features and ensuring that management interfaces are not exposed to the internet can reduce the attack surface. Network administrators should monitor router logs for suspicious activity related to the /goform/delete_offline_device endpoint and unusual command executions. Employing intrusion detection/prevention systems (IDS/IPS) with signatures targeting this exploit can provide additional defense. Where possible, replacing vulnerable routers with updated models or alternative devices with active security support is advisable. Organizations should also educate users about the risks and encourage prompt reporting of network anomalies. Finally, maintaining regular backups of router configurations can facilitate recovery if compromise occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-11095: Command Injection in D-Link DIR-823X
Description
A vulnerability was detected in D-Link DIR-823X 250416. This vulnerability affects unknown code of the file /goform/delete_offline_device. Performing manipulation of the argument delvalue results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11095 is a command injection vulnerability identified in the D-Link DIR-823X router, specifically affecting firmware version 250416. The vulnerability resides in the handling of the /goform/delete_offline_device endpoint, where manipulation of the 'delvalue' argument allows an attacker to inject arbitrary commands. This flaw enables remote exploitation without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts the confidentiality, integrity, and availability of the affected device by potentially allowing an attacker to execute arbitrary commands with elevated privileges, leading to unauthorized control over the router. Although the CVSS score is medium (5.3), the presence of a public exploit increases the risk of exploitation. The vulnerability does not require user interaction and has low attack complexity, but it does require some level of privileges (PR:L), suggesting that the attacker might need limited access or be on the local network or have some form of authenticated access. The lack of patch links suggests that no official fix has been released at the time of publication, increasing the urgency for mitigation. The router’s role as a network gateway means exploitation could facilitate further attacks on connected devices or network traffic interception.
Potential Impact
For European organizations, the exploitation of this vulnerability could lead to significant network security breaches. Compromised routers can serve as entry points for attackers to infiltrate corporate networks, intercept sensitive communications, or launch lateral movement attacks. Given the widespread use of D-Link routers in small to medium enterprises and home office environments across Europe, the risk extends to both corporate and remote work infrastructures. Attackers could disrupt business operations by altering network configurations, causing denial of service, or deploying malware. The vulnerability's ability to execute arbitrary commands remotely could also enable attackers to establish persistent access or exfiltrate confidential data. This is particularly critical for sectors with stringent data protection requirements under GDPR, as breaches could lead to regulatory penalties and reputational damage. Additionally, the lack of a patch at the time of disclosure means organizations must rely on alternative mitigations, increasing exposure duration.
Mitigation Recommendations
Organizations should immediately inventory their network devices to identify any D-Link DIR-823X routers running firmware version 250416. Until an official patch is released, it is crucial to restrict access to the router’s management interfaces by implementing network segmentation and firewall rules that limit access to trusted IP addresses only. Disabling remote management features and ensuring that management interfaces are not exposed to the internet can reduce the attack surface. Network administrators should monitor router logs for suspicious activity related to the /goform/delete_offline_device endpoint and unusual command executions. Employing intrusion detection/prevention systems (IDS/IPS) with signatures targeting this exploit can provide additional defense. Where possible, replacing vulnerable routers with updated models or alternative devices with active security support is advisable. Organizations should also educate users about the risks and encourage prompt reporting of network anomalies. Finally, maintaining regular backups of router configurations can facilitate recovery if compromise occurs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-27T08:17:37.003Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d9ce3549cfd472f579504f
Added to database: 9/29/2025, 12:09:25 AM
Last enriched: 9/29/2025, 12:11:23 AM
Last updated: 9/29/2025, 12:48:09 AM
Views: 3
Related Threats
CVE-2025-11130: Missing Authentication in iHongRen pptp-vpn
HighCVE-2025-11097: Command Injection in D-Link DIR-823X
MediumCVE-2025-11099: Command Injection in D-Link DIR-823X
MediumCVE-2025-11102: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-11106: SQL Injection in code-projects Simple Scheduling System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.