Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4193: Improper Access Controls in D-Link DIR-823G

0
Medium
VulnerabilityCVE-2026-4193cvecve-2026-4193
Published: Sun Mar 15 2026 (03/15/2026, 23:02:10 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-823G

Description

CVE-2026-4193 is a medium severity vulnerability affecting the D-Link DIR-823G router version 1. 0. 2B05. It involves improper access controls in multiple functions of the goahead component, allowing remote attackers to manipulate critical router settings without authentication or user interaction. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized changes to network configurations such as firewall, DDNS, guest network, and access control lists. Although the product is no longer supported and no patches are available, the exploit has been publicly disclosed, increasing the risk of exploitation. Organizations using this router model remain vulnerable to remote attacks that could disrupt network operations or compromise internal network security. Mitigation requires device replacement or network segmentation to isolate affected routers. Countries with significant D-Link market presence and critical infrastructure reliance on such devices are at higher risk. The CVSS 4.

AI-Powered Analysis

AILast updated: 03/15/2026, 23:20:43 UTC

Technical Analysis

CVE-2026-4193 is a security vulnerability identified in the D-Link DIR-823G router firmware version 1.0.2B05. The flaw resides in the goahead web server component, specifically in multiple functions responsible for retrieving and setting various router configurations such as DDNS settings, firewall settings, guest network settings, LAN/WAN configurations, QoS, WPS, and access control lists. Due to improper access control implementation, remote attackers can invoke these functions without authentication or user interaction, allowing unauthorized manipulation of critical router settings. This can lead to unauthorized disclosure of sensitive network information, alteration of firewall rules, enabling or disabling guest networks, and modification of access control policies. The vulnerability is remotely exploitable over the network, does not require privileges or user interaction, and affects only the specified firmware version of a product that is no longer supported by D-Link, meaning no official patches are available. The CVSS 4.0 base score of 6.9 indicates a medium severity level, reflecting the ease of exploitation and the potential impact on confidentiality, integrity, and availability of the affected device and network. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The lack of ongoing vendor support complicates remediation efforts, necessitating alternative mitigation strategies such as device replacement or network isolation.

Potential Impact

The vulnerability allows remote attackers to bypass authentication and manipulate critical router settings, which can severely impact the confidentiality, integrity, and availability of network operations. Unauthorized changes to firewall settings could expose internal networks to external threats or disrupt legitimate traffic. Modification of guest network or access control settings can lead to unauthorized network access or lateral movement within the network. Alterations to WAN/LAN configurations and QoS settings can degrade network performance or cause denial of service. Since the affected product is no longer supported, organizations cannot rely on vendor patches, increasing the risk of prolonged exposure. Exploitation could facilitate further attacks such as data interception, network reconnaissance, or persistent compromise of network infrastructure. The broad range of affected functions amplifies the potential damage, making this a significant threat for environments still using this router model.

Mitigation Recommendations

Given the lack of vendor support and absence of patches, the most effective mitigation is to replace the affected D-Link DIR-823G routers with supported models that receive regular security updates. If immediate replacement is not feasible, organizations should isolate these devices on segmented network zones with strict access controls to limit exposure to untrusted networks. Disable remote management interfaces and restrict administrative access to trusted IP addresses only. Employ network monitoring to detect anomalous configuration changes or suspicious traffic patterns targeting the router. Regularly audit router configurations to identify unauthorized modifications. Implement compensating controls such as firewall rules to block access to the router’s management ports from untrusted sources. Educate network administrators about the risks and signs of exploitation related to this vulnerability. Maintain an inventory of affected devices to prioritize remediation efforts. Consider deploying network intrusion detection systems capable of identifying exploitation attempts targeting the goahead component functions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-15T08:07:31.639Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b73b569d4df451838881f5

Added to database: 3/15/2026, 11:05:58 PM

Last enriched: 3/15/2026, 11:20:43 PM

Last updated: 3/16/2026, 5:15:12 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses