Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4193: Improper Access Controls in D-Link DIR-823G

0
Medium
VulnerabilityCVE-2026-4193cvecve-2026-4193
Published: Sun Mar 15 2026 (03/15/2026, 23:02:10 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-823G

Description

CVE-2026-4193 is a medium-severity vulnerability affecting the D-Link DIR-823G router version 1. 0. 2B05. It involves improper access controls in multiple functions of the goahead component, allowing remote attackers to manipulate critical router settings without authentication or user interaction. The vulnerability impacts various configuration functions such as DDNS, firewall, guest network, LAN/WAN settings, and more. Although the product is no longer supported and no patches are available, the exploit has been publicly disclosed, increasing the risk of exploitation. The CVSS 4. 0 score is 6. 9, reflecting the ease of remote exploitation and the potential for confidentiality, integrity, and availability impacts. Organizations using this router model remain at risk, especially if devices are exposed to untrusted networks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 00:43:17 UTC

Technical Analysis

CVE-2026-4193 is a security vulnerability identified in the D-Link DIR-823G router firmware version 1.0.2B05. The flaw resides in the goahead web server component, specifically in multiple functions responsible for retrieving and setting various router configurations such as GetDDNSSettings, GetFirewallSettings, SetAccessCtlList, SetDeviceSettings, and others. These functions lack proper access control mechanisms, enabling remote attackers to invoke them without authentication or user interaction. This improper access control allows attackers to manipulate critical router settings remotely, potentially altering network configurations, firewall rules, guest network parameters, and other sensitive settings. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N). The impact affects confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L). The vulnerability affects only the specified firmware version, which is no longer supported by D-Link, and no official patches are available. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of active exploitation. The vulnerability's CVSS 4.0 score of 6.9 reflects a medium severity level, balancing the ease of exploitation with the scope and impact of the attack. The lack of support and patches means affected organizations must rely on alternative mitigation strategies such as device replacement or network isolation.

Potential Impact

The improper access control vulnerability in D-Link DIR-823G routers can have significant impacts on affected organizations. Attackers can remotely manipulate router configurations, potentially leading to unauthorized changes in network topology, firewall rules, and access control lists. This can result in network traffic interception, unauthorized access to internal resources, disruption of network services, and exposure of sensitive information. The ability to alter guest network settings and firewall configurations can facilitate lateral movement within networks or create backdoors for persistent access. Since the device is a network gateway, compromise can affect the confidentiality, integrity, and availability of the entire network segment it serves. The lack of vendor support and patches exacerbates the risk, as vulnerable devices remain exposed indefinitely. Organizations relying on these routers in critical environments or with internet-facing management interfaces are particularly at risk. The medium severity rating indicates a moderate but tangible threat that requires attention to prevent exploitation.

Mitigation Recommendations

Given the absence of official patches for this unsupported firmware version, organizations should prioritize replacing the affected D-Link DIR-823G devices with newer, supported models that receive regular security updates. If immediate replacement is not feasible, network administrators should implement strict network segmentation to isolate these routers from untrusted networks, especially the internet, to reduce exposure. Disable remote management interfaces or restrict access to trusted IP addresses only. Employ network-level access controls such as firewalls to block unauthorized inbound traffic targeting router management ports. Regularly audit router configurations and logs for unauthorized changes or suspicious activity. Consider deploying intrusion detection/prevention systems (IDS/IPS) to monitor for exploitation attempts. Educate users and administrators about the risks of using unsupported hardware and the importance of timely device upgrades. Finally, maintain an inventory of all network devices to identify and track vulnerable equipment proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-15T08:07:31.639Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b73b569d4df451838881f5

Added to database: 3/15/2026, 11:05:58 PM

Last enriched: 3/23/2026, 12:43:17 AM

Last updated: 4/29/2026, 2:09:07 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses