Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2143: OS Command Injection in D-Link DIR-823X

0
High
VulnerabilityCVE-2026-2143cvecve-2026-2143
Published: Sun Feb 08 2026 (02/08/2026, 08:32:07 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-823X

Description

CVE-2026-2143 is a high-severity OS command injection vulnerability affecting the D-Link DIR-823X router firmware version 250416. The flaw exists in the DDNS service component, specifically in the /goform/set_ddns endpoint, where unsanitized input parameters (ddnsType, ddnsDomainName, ddnsUserName, ddnsPwd) allow remote attackers to execute arbitrary OS commands. Exploitation requires no user interaction but does require some level of privilege (PR:H) on the device. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability of the affected device and potentially the network behind it. European organizations using this D-Link model are at risk, especially in countries with high D-Link market penetration and critical infrastructure relying on these routers. Mitigation involves applying vendor patches once available, restricting remote management access, and monitoring network traffic for suspicious activity. Countries like Germany, France, Italy, Spain, and the UK are likely most affected due to widespread use of D-Link devices and strategic importance of network infrastructure. Given the CVSS 4. 0 score of 8.

AI-Powered Analysis

AILast updated: 02/08/2026, 08:59:39 UTC

Technical Analysis

CVE-2026-2143 is an OS command injection vulnerability identified in the D-Link DIR-823X router firmware version 250416. The vulnerability resides in the Dynamic DNS (DDNS) service component, specifically in the processing of the /goform/set_ddns endpoint. This endpoint accepts parameters such as ddnsType, ddnsDomainName, ddnsUserName, and ddnsPwd, which are improperly sanitized before being used in OS command execution contexts. An attacker can remotely send crafted requests to this endpoint to inject arbitrary operating system commands, leading to full compromise of the device. The vulnerability does not require user interaction but does require some privilege level on the device (PR:H), indicating that an attacker must have some form of authenticated access or elevated privileges to exploit it. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H, I:H, A:H). Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the risk of exploitation by threat actors. The compromised router could be used to intercept or manipulate network traffic, launch further attacks inside the network, or disrupt network availability. The lack of an official patch at the time of disclosure necessitates immediate mitigation efforts by administrators. This vulnerability highlights the risks associated with embedded device firmware and the importance of secure input validation in network device management interfaces.

Potential Impact

For European organizations, the impact of CVE-2026-2143 can be significant. The D-Link DIR-823X router is commonly used in small to medium enterprises and residential environments, meaning that both corporate and home office networks could be affected. Successful exploitation allows attackers to execute arbitrary commands on the router, potentially leading to full device compromise. This can result in interception of sensitive data, unauthorized network access, lateral movement within corporate networks, and disruption of network services. Given the high impact on confidentiality, integrity, and availability, critical infrastructure relying on these devices could face operational disruptions or data breaches. The remote exploitability without user interaction increases the risk of automated attacks or worm-like propagation. European organizations with remote management enabled on these devices are particularly vulnerable. The absence of a patch at disclosure time means organizations must rely on compensating controls to reduce exposure. Additionally, the public disclosure may attract cybercriminals targeting European entities due to the region's high reliance on networked infrastructure and digital services.

Mitigation Recommendations

1. Immediately restrict or disable remote management interfaces on affected D-Link DIR-823X devices to prevent external exploitation. 2. Implement network segmentation to isolate vulnerable routers from critical internal systems, limiting potential lateral movement. 3. Monitor network traffic for unusual patterns or commands targeting the /goform/set_ddns endpoint, using IDS/IPS solutions with custom signatures if possible. 4. Apply vendor-provided firmware updates or patches as soon as they become available; regularly check D-Link’s official channels for updates. 5. Enforce strong authentication and access controls on router management interfaces to reduce the risk of privilege escalation. 6. Conduct regular vulnerability assessments and penetration testing focusing on network devices to identify similar weaknesses. 7. Educate IT staff about the risks of command injection and the importance of input validation in network device configurations. 8. Consider replacing outdated or unsupported devices with models that receive timely security updates and have a better security posture. 9. Employ network-level filtering to block suspicious outbound connections originating from routers that could indicate compromise. 10. Maintain comprehensive logs and enable alerting for configuration changes on network devices to detect potential exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T21:09:42.389Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69884d18f9fa50a62f96e2a4

Added to database: 2/8/2026, 8:45:12 AM

Last enriched: 2/8/2026, 8:59:39 AM

Last updated: 2/8/2026, 9:56:18 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats