Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1544: OS Command Injection in D-Link DIR-823X

0
Medium
VulnerabilityCVE-2026-1544cvecve-2026-1544
Published: Wed Jan 28 2026 (01/28/2026, 21:32:09 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-823X

Description

A security flaw has been discovered in D-Link DIR-823X 250416. Impacted is the function sub_41E2A0 of the file /goform/set_mode. Performing a manipulation of the argument lan_gateway results in os command injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:33:03 UTC

Technical Analysis

CVE-2026-1544 is an OS command injection vulnerability identified in the D-Link DIR-823X router, version 250416. The vulnerability resides in the function sub_41E2A0 within the /goform/set_mode endpoint, where improper sanitization of the lan_gateway parameter allows an attacker to inject arbitrary operating system commands. This flaw can be exploited remotely without requiring authentication or user interaction, making it a critical entry point for attackers to gain control over affected devices. The vulnerability has been assigned a CVSS 4.0 score of 5.3, indicating a medium severity level due to its potential impact on confidentiality, integrity, and availability, combined with ease of exploitation. The vendor no longer supports the affected product version, and no official patches have been released. Publicly available exploit code increases the likelihood of exploitation attempts. The vulnerability could allow attackers to execute commands that compromise the router’s functionality, intercept or redirect network traffic, or use the device as a foothold for further attacks within a network. Given the router’s role in home and small business environments, exploitation could lead to significant privacy and security risks.

Potential Impact

The impact of CVE-2026-1544 can be significant for organizations and individuals relying on the D-Link DIR-823X router. Successful exploitation allows remote attackers to execute arbitrary OS commands, potentially leading to full device compromise. This could result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of internet connectivity, and use of the compromised device as a pivot point for lateral movement or launching attacks against other systems. Since the affected product is no longer supported, organizations cannot rely on vendor patches, increasing exposure duration. The vulnerability poses a particular risk to small businesses and home users who may lack advanced security controls. Additionally, critical infrastructure or enterprises using these routers in branch offices or remote sites could face operational disruptions and data breaches. The public availability of exploit code further elevates the threat level, potentially attracting opportunistic attackers and automated scanning tools.

Mitigation Recommendations

Given the lack of vendor patches for the unsupported DIR-823X version 250416, organizations should implement compensating controls to mitigate risk. First, immediately disable any remote management interfaces exposed to untrusted networks to reduce attack surface. Network segmentation should be employed to isolate vulnerable routers from critical internal systems. Replace affected devices with supported models that receive regular security updates. If replacement is not immediately feasible, restrict access to the router’s management interface to trusted IP addresses only. Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected command execution or outbound connections. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns targeting this router. Regularly audit and update network device inventories to identify and remediate unsupported hardware. Educate users about the risks of using unsupported devices and encourage timely hardware upgrades. Finally, consider deploying network-level filtering to block malicious payloads targeting the lan_gateway parameter.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-28T15:18:21.972Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697a84c24623b1157cf1f0aa

Added to database: 1/28/2026, 9:50:58 PM

Last enriched: 2/23/2026, 10:33:03 PM

Last updated: 3/26/2026, 4:43:51 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses