Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1685: Improper Restriction of Excessive Authentication Attempts in D-Link DIR-823X

0
Medium
VulnerabilityCVE-2026-1685cvecve-2026-1685
Published: Fri Jan 30 2026 (01/30/2026, 14:32:10 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-823X

Description

A vulnerability was identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_40AC74 of the component Login. Such manipulation leads to improper restriction of excessive authentication attempts. The attack may be performed from remote. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 01/30/2026, 15:12:06 UTC

Technical Analysis

CVE-2026-1685 identifies an authentication bypass vulnerability in the D-Link DIR-823X router firmware version 250416. The vulnerability resides in the login component, specifically the function sub_40AC74, which improperly restricts excessive authentication attempts. This flaw allows an attacker to perform repeated login attempts remotely without triggering lockout mechanisms or throttling controls, effectively enabling brute-force or credential stuffing attacks. The vulnerability does not require any privileges or user interaction, and the attack vector is network-based (remote). Despite the high complexity of the exploit, a public exploit is available, increasing the risk of exploitation. The CVSS 4.0 score is 6.3 (medium), reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and low impact on confidentiality. The vulnerability could allow unauthorized access to the router’s administrative interface, potentially leading to further compromise of the internal network, interception of traffic, or manipulation of device settings. No patches or official fixes have been linked yet, so mitigation relies on network-level controls and monitoring. The vulnerability is significant for environments where these routers are deployed, especially in enterprise or critical infrastructure contexts.

Potential Impact

For European organizations, exploitation of CVE-2026-1685 could result in unauthorized administrative access to D-Link DIR-823X routers, compromising network security. Attackers could manipulate device configurations, intercept or redirect network traffic, or establish persistent footholds within internal networks. This could lead to data breaches, disruption of services, or lateral movement to other critical systems. The medium severity indicates moderate impact, but the remote attack vector and lack of required privileges increase the threat surface. Organizations relying on these routers for perimeter or internal network segmentation face increased risk of exposure. The impact is particularly concerning for sectors such as government, finance, healthcare, and critical infrastructure in Europe, where network integrity and confidentiality are paramount. Additionally, the availability of a public exploit raises the likelihood of opportunistic attacks, especially in environments with weak monitoring or delayed patching processes.

Mitigation Recommendations

European organizations should immediately identify any deployments of the D-Link DIR-823X router with firmware version 250416 and prioritize remediation. Since no official patches are currently linked, mitigation should include: 1) Restricting remote management access to trusted IP addresses or disabling it entirely; 2) Implementing network-level protections such as firewall rules to limit access to the router’s login interface; 3) Enabling multi-factor authentication if supported by the device; 4) Monitoring authentication logs for repeated failed login attempts and triggering alerts; 5) Segmenting the network to isolate vulnerable devices from critical assets; 6) Considering replacement or firmware upgrade to versions without this vulnerability once available; 7) Educating IT staff on the risks of brute-force attacks and ensuring strong password policies are enforced on all devices; 8) Employing intrusion detection/prevention systems to detect anomalous login attempts targeting the router. These steps go beyond generic advice by focusing on compensating controls until a patch is released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-30T07:40:40.236Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697cc6ebac063202225ecfae

Added to database: 1/30/2026, 2:57:47 PM

Last enriched: 1/30/2026, 3:12:06 PM

Last updated: 1/31/2026, 6:02:00 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats