Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1544: OS Command Injection in D-Link DIR-823X

0
Medium
VulnerabilityCVE-2026-1544cvecve-2026-1544
Published: Wed Jan 28 2026 (01/28/2026, 21:32:09 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-823X

Description

CVE-2026-1544 is a medium-severity OS command injection vulnerability affecting the D-Link DIR-823X router, specifically version 250416. The flaw exists in the /goform/set_mode endpoint within the sub_41E2A0 function, where manipulation of the lan_gateway argument allows remote attackers to execute arbitrary OS commands. Exploitation does not require user interaction or authentication, increasing its risk. However, the affected product is no longer supported by D-Link, and no official patches are available. Although no known exploits are currently observed in the wild, a public exploit has been released, raising the potential for future attacks. European organizations using this router model may face risks of device compromise, network infiltration, and data exposure. Mitigation options are limited to device replacement or network-level protections such as firewall rules and segmentation. Countries with higher D-Link market penetration and critical infrastructure relying on these devices are more likely to be impacted.

AI-Powered Analysis

AILast updated: 01/28/2026, 22:05:57 UTC

Technical Analysis

CVE-2026-1544 is an OS command injection vulnerability identified in the D-Link DIR-823X router, version 250416. The vulnerability resides in the function sub_41E2A0 within the /goform/set_mode endpoint, where the lan_gateway parameter is improperly sanitized. This flaw allows an attacker to inject arbitrary operating system commands remotely without requiring authentication or user interaction. The vulnerability is exploitable over the network, making it a significant risk for exposed devices. The CVSS 4.0 base score is 5.3 (medium), reflecting the ease of exploitation (network vector, low attack complexity) but limited impact on confidentiality, integrity, and availability (low to low impact). The product affected is no longer supported by the vendor, and no patches or official mitigations have been released. A public exploit is available, increasing the likelihood of exploitation by threat actors. The lack of vendor support means that affected devices remain vulnerable unless replaced or protected by external controls. This vulnerability could be leveraged to gain control over the router, enabling attackers to manipulate network traffic, launch further attacks within the network, or exfiltrate sensitive information.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to unauthorized control over affected routers, resulting in network traffic interception, redirection, or disruption. Compromised routers could serve as footholds for lateral movement within corporate networks or as platforms for launching attacks against other internal or external targets. The impact is particularly concerning for organizations relying on the DIR-823X in critical infrastructure, small and medium enterprises, or home office environments where these devices are commonly deployed. Since the device is no longer supported, organizations cannot rely on vendor patches, increasing the risk of prolonged exposure. This could lead to data breaches, loss of network availability, and reputational damage. Additionally, attackers could use compromised routers to create botnets or conduct denial-of-service attacks, affecting broader network stability.

Mitigation Recommendations

Given the absence of vendor patches, the primary mitigation is to replace the affected D-Link DIR-823X devices with supported and updated hardware. Until replacement is feasible, organizations should implement strict network segmentation to isolate vulnerable routers from critical systems and sensitive data. Deploying firewall rules to restrict access to the router’s management interfaces, especially blocking inbound traffic to the /goform/set_mode endpoint, can reduce exposure. Monitoring network traffic for unusual patterns or command injection attempts targeting the lan_gateway parameter is advisable. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability can help detect exploitation attempts. Regularly auditing network devices to identify unsupported or vulnerable hardware is critical. Educating users about the risks of using unsupported devices and enforcing policies to phase out such equipment will reduce future risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-28T15:18:21.972Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697a84c24623b1157cf1f0aa

Added to database: 1/28/2026, 9:50:58 PM

Last enriched: 1/28/2026, 10:05:57 PM

Last updated: 1/28/2026, 11:24:37 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats