Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2081: OS Command Injection in D-Link DIR-823X

0
Medium
VulnerabilityCVE-2026-2081cvecve-2026-2081
Published: Sat Feb 07 2026 (02/07/2026, 09:32:09 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-823X

Description

A vulnerability was determined in D-Link DIR-823X 250416. The affected element is an unknown function of the file /goform/set_password. This manipulation of the argument http_passwd causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:24:53 UTC

Technical Analysis

CVE-2026-2081 identifies an OS command injection vulnerability in the D-Link DIR-823X router firmware version 250416. The vulnerability exists in an unspecified function within the /goform/set_password endpoint, where the http_passwd parameter is improperly sanitized or validated. This flaw allows an attacker to inject arbitrary operating system commands remotely, potentially leading to full system compromise. The vulnerability is exploitable over the network without user interaction, but requires high privileges, indicating that an attacker must already have some elevated access or credentials to exploit it. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the moderate impact and exploitation complexity. The vulnerability affects confidentiality, integrity, and availability of the device, as arbitrary commands can be executed on the underlying OS. Although no known exploits have been observed in the wild, the public disclosure increases the risk of exploitation. The lack of official patches or mitigation guidance at this time necessitates proactive defensive measures. This vulnerability highlights the importance of secure input validation in router management interfaces and the risks posed by exposed administrative endpoints.

Potential Impact

If exploited, this vulnerability could allow attackers to execute arbitrary OS commands on the affected router, leading to full compromise of the device. This could result in unauthorized access to network traffic, manipulation or disruption of network services, and potential pivoting to internal networks. The confidentiality of sensitive data passing through the router could be breached, integrity of network configurations could be altered, and availability could be disrupted by malicious commands. Organizations relying on the DIR-823X for critical network infrastructure may face operational disruptions, data breaches, and increased risk of lateral movement by attackers. The requirement for high privileges limits exploitation to attackers who have already gained some level of access, but the remote nature of the vulnerability still poses a significant risk. The absence of known exploits in the wild currently reduces immediate threat but does not eliminate future risk, especially after public disclosure.

Mitigation Recommendations

1. Immediately restrict access to the router’s administrative interface to trusted networks and IP addresses only, using firewall rules or network segmentation. 2. Disable remote management features if not strictly necessary to reduce exposure. 3. Monitor network traffic and router logs for unusual activity or unauthorized access attempts targeting the /goform/set_password endpoint. 4. Implement strong authentication and credential management to prevent attackers from obtaining the high privileges required for exploitation. 5. Regularly check for official firmware updates or patches from D-Link addressing this vulnerability and apply them promptly once available. 6. If patching is delayed, consider deploying network-based intrusion prevention systems (IPS) with custom rules to detect and block command injection patterns targeting this endpoint. 7. Conduct internal audits of router configurations and access controls to ensure minimal exposure. 8. Educate network administrators about this vulnerability and the importance of secure router management practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T08:07:39.800Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69884451f9fa50a62f927de3

Added to database: 2/8/2026, 8:07:45 AM

Last enriched: 2/23/2026, 9:24:53 PM

Last updated: 3/26/2026, 3:35:42 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses