Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11097: Command Injection in D-Link DIR-823X

0
Medium
VulnerabilityCVE-2025-11097cvecve-2025-11097
Published: Sun Sep 28 2025 (09/28/2025, 05:02:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-823X

Description

A vulnerability has been found in D-Link DIR-823X 250416. Impacted is an unknown function of the file /goform/set_device_name. The manipulation of the argument mac leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 10/06/2025, 00:35:34 UTC

Technical Analysis

CVE-2025-11097 is a command injection vulnerability identified in the D-Link DIR-823X router firmware version 250416. The vulnerability resides in an unspecified function associated with the /goform/set_device_name endpoint, where the 'mac' parameter can be manipulated by an attacker to inject and execute arbitrary system commands. This flaw allows remote attackers to execute commands on the device without requiring user interaction and with only low privileges, which significantly lowers the barrier to exploitation. The vulnerability does not require authentication, making it accessible to unauthenticated remote attackers over the network. The CVSS v4.0 score of 5.3 reflects a medium severity, considering the attack vector is network-based, with low complexity and no user interaction, but limited impact on confidentiality, integrity, and availability (each rated low). Although there are no known exploits currently active in the wild, the public disclosure of the exploit code increases the risk of exploitation. Successful exploitation could allow attackers to gain control over the router, potentially leading to network traffic interception, disruption of network services, or pivoting to other internal systems. The vulnerability affects a widely deployed consumer and small business router model, which may be present in many European organizations' network environments. The absence of an official patch at the time of disclosure necessitates immediate mitigation steps to reduce exposure.

Potential Impact

For European organizations, the impact of CVE-2025-11097 can be significant, especially for those relying on the D-Link DIR-823X routers in their network infrastructure. Exploitation could lead to unauthorized command execution on routers, resulting in compromised network integrity and availability. Attackers could intercept or manipulate network traffic, disrupt connectivity, or use the compromised device as a foothold for further attacks within the corporate network. This is particularly critical for organizations with remote management enabled or those exposing the router's management interface to the internet. The vulnerability could affect confidentiality if attackers intercept sensitive data passing through the device. Given the medium severity and ease of remote exploitation without authentication, organizations face a tangible risk of targeted attacks or opportunistic scanning and exploitation. The impact is heightened for sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government entities within Europe.

Mitigation Recommendations

1. Immediately restrict remote access to the router's management interface by disabling remote administration or limiting access to trusted IP addresses only. 2. Monitor network traffic for unusual or suspicious activity targeting the /goform/set_device_name endpoint or abnormal command execution patterns. 3. Implement network segmentation to isolate vulnerable routers from critical systems and sensitive data environments. 4. Regularly audit and update router firmware; apply vendor patches as soon as they become available for the DIR-823X model. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting command injection attempts. 6. Educate network administrators about the vulnerability and encourage immediate action to reduce exposure. 7. Consider replacing affected devices with models from vendors with a stronger security track record if patches are delayed. 8. Use strong, unique credentials for router management interfaces to prevent unauthorized access if authentication is required in other contexts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-27T08:17:42.096Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d9ce3549cfd472f5795048

Added to database: 9/29/2025, 12:09:25 AM

Last enriched: 10/6/2025, 12:35:34 AM

Last updated: 11/13/2025, 6:32:15 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats