Vulnerability Description
A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_wifidog_settings. Executing a manipulation of the argument wd_enable can lead to command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-823X Firmware | 250126 |
| Dlink | Dir-823X | - |
Related Weaknesses (CWE)
References
- https://github.com/DavCloudz/cve/blob/main/D-link/DIR_823X/DIR-823X%20V250416%20ExploitThird Party Advisory
- https://vuldb.com/?ctiid.341717Permissions RequiredVDB Entry
- https://vuldb.com/?id.341717Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.734966Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.743503
- https://www.dlink.com/Product
FAQ
What is CVE-2026-1125?
CVE-2026-1125 is a vulnerability with a CVSS score of 7.3 (HIGH). A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_wifidog_settings. Executing a manipulation of the argument wd_enable...
How severe is CVE-2026-1125?
CVE-2026-1125 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1125?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-823X Firmware, Dlink Dir-823X.