Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2061: OS Command Injection in D-Link DIR-823X

0
Medium
VulnerabilityCVE-2026-2061cvecve-2026-2061
Published: Fri Feb 06 2026 (02/06/2026, 18:02:09 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-823X

Description

A vulnerability was determined in D-Link DIR-823X 250416. Affected by this issue is the function sub_424D20 of the file /goform/set_ipv6. Executing a manipulation can lead to os command injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:08:55 UTC

Technical Analysis

CVE-2026-2061 is a remote OS command injection vulnerability identified in the D-Link DIR-823X router, firmware version 250416. The vulnerability resides in the function sub_424D20 within the /goform/set_ipv6 endpoint, which improperly sanitizes user input, allowing attackers to inject and execute arbitrary OS commands remotely. This flaw does not require user interaction or authentication, making it particularly dangerous as it can be exploited over the network without credentials. The vulnerability has been assigned a CVSS 4.0 score of 5.1, reflecting medium severity due to the requirement of high privileges (PR:H) but no user interaction or authentication. The impact on confidentiality, integrity, and availability is limited but non-negligible, as attackers could potentially manipulate device settings, disrupt network operations, or pivot to internal networks. Although no known exploits are currently active in the wild, the public disclosure increases the likelihood of exploitation attempts. The lack of available patches at the time of disclosure necessitates immediate mitigation measures to reduce exposure. This vulnerability highlights the importance of secure input validation and access controls in embedded device firmware, especially for network infrastructure components like routers.

Potential Impact

The exploitation of CVE-2026-2061 could allow remote attackers to execute arbitrary OS commands on affected D-Link DIR-823X routers, potentially leading to unauthorized control over the device. This could result in disruption of network services, interception or manipulation of network traffic, and use of the compromised router as a foothold for further attacks within the internal network. The impact on confidentiality includes potential exposure of sensitive network configuration and traffic data. Integrity could be compromised by unauthorized changes to device settings or firmware. Availability may be affected if attackers disrupt router functionality or cause denial of service. While the vulnerability requires high privileges, the absence of authentication and user interaction requirements lowers the barrier for exploitation. Organizations relying on these routers for critical network infrastructure may face operational disruptions and increased risk of lateral movement by attackers. The medium severity rating reflects a moderate but significant risk, especially in environments where these devices are widely deployed without adequate network segmentation or monitoring.

Mitigation Recommendations

1. Immediately restrict remote management access to the D-Link DIR-823X routers by disabling WAN-side administration or limiting it to trusted IP addresses. 2. Implement network segmentation to isolate vulnerable routers from critical internal systems, reducing the potential impact of compromise. 3. Monitor network traffic for unusual or suspicious requests targeting the /goform/set_ipv6 endpoint or other router management interfaces. 4. Apply firmware updates from D-Link as soon as they become available to address this vulnerability. 5. If patches are not yet available, consider temporary workarounds such as firewall rules blocking access to the vulnerable endpoint or disabling IPv6 configuration features if feasible. 6. Conduct regular security audits and vulnerability scans on network devices to identify and remediate similar issues proactively. 7. Educate network administrators about the risks of exposed management interfaces and the importance of secure configuration practices. 8. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting command injection attempts targeting router management interfaces.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T06:34:43.625Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69862fadf9fa50a62f2569be

Added to database: 2/6/2026, 6:15:09 PM

Last enriched: 2/23/2026, 10:08:55 PM

Last updated: 3/22/2026, 6:38:59 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses