Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2129: OS Command Injection in D-Link DIR-823X

0
High
VulnerabilityCVE-2026-2129cvecve-2026-2129
Published: Sun Feb 08 2026 (02/08/2026, 01:32:08 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-823X

Description

A vulnerability was found in D-Link DIR-823X 250416. Affected by this issue is some unknown functionality of the file /goform/set_ac_status. Performing a manipulation of the argument ac_ipaddr/ac_ipstatus/ap_randtime results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:30:33 UTC

Technical Analysis

CVE-2026-2129 is an OS command injection vulnerability identified in the D-Link DIR-823X router, version 250416. The vulnerability resides in the handling of the /goform/set_ac_status endpoint, where certain parameters—ac_ipaddr, ac_ipstatus, and ap_randtime—are improperly sanitized, allowing an attacker to inject arbitrary operating system commands. This flaw can be exploited remotely without user interaction, but requires high privileges, indicating that the attacker must have some form of authenticated access or elevated rights on the device. The vulnerability has a CVSS 4.0 base score of 8.6, reflecting its high severity due to the potential for complete system compromise. The attack vector is network-based with low attack complexity and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could execute commands to manipulate device settings, intercept or alter network traffic, or disrupt router functionality. Although no exploits are currently reported in the wild, the public disclosure of the vulnerability details increases the risk of exploitation. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by administrators. The vulnerability is critical for environments relying on this router model, especially where remote management is enabled or where the device is exposed to untrusted networks.

Potential Impact

The impact of CVE-2026-2129 is significant for organizations using the D-Link DIR-823X router, particularly version 250416. Successful exploitation allows remote attackers to execute arbitrary OS commands on the device, leading to full compromise of the router. This can result in unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and potential pivoting to other internal systems. The confidentiality of network traffic can be breached, integrity of configurations and data can be compromised, and availability of network connectivity can be disrupted. Given the router’s role as a network gateway, the vulnerability poses a critical risk to enterprise, small business, and home networks alike. Organizations with remote management enabled or those exposing the router’s management interface to the internet are particularly vulnerable. The absence of known exploits in the wild currently reduces immediate risk but the public disclosure increases the likelihood of future attacks. The vulnerability could be leveraged in targeted attacks against high-value networks or in widespread campaigns if automated exploit tools emerge.

Mitigation Recommendations

To mitigate CVE-2026-2129, organizations should take the following specific actions: 1) Immediately restrict remote access to the router’s management interface by disabling WAN-side administration or limiting access to trusted IP addresses. 2) Monitor network traffic for unusual commands or patterns targeting the /goform/set_ac_status endpoint. 3) Implement network segmentation to isolate vulnerable devices from critical infrastructure. 4) Apply any vendor-released patches or firmware updates as soon as they become available. 5) If patches are not yet available, consider temporary device replacement or disabling vulnerable functionalities if possible. 6) Enforce strong authentication and access controls on router management interfaces to prevent unauthorized privilege escalation. 7) Conduct regular security assessments and vulnerability scans on network devices to detect similar issues. 8) Educate network administrators about the risks of command injection and the importance of input validation in device management interfaces. These steps go beyond generic advice by focusing on access restriction, monitoring, and proactive device management tailored to this specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T20:45:52.197Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6987ee2cf9fa50a62f16ff9d

Added to database: 2/8/2026, 2:00:12 AM

Last enriched: 2/23/2026, 9:30:33 PM

Last updated: 3/25/2026, 9:52:55 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses