← Back to CVEs
CVE-2026-2143
HIGH7.2
Description
A security vulnerability has been detected in D-Link DIR-823X 250416. This issue affects some unknown processing of the file /goform/set_ddns of the component DDNS Service. The manipulation of the argument ddnsType/ddnsDomainName/ddnsUserName/ddnsPwd leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
CVE Details
CVSS v3.1 Score7.2
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published2/8/2026
Last Modified2/10/2026
Sourcenvd
Honeypot Sightings0
Affected Products
dlink:dir-823xdlink:dir-823x_firmware
Weaknesses (CWE)
CWE-77CWE-78
References
https://github.com/master-abc/cve/issues/25(cna@vuldb.com)
https://vuldb.com/?ctiid.344778(cna@vuldb.com)
https://vuldb.com/?id.344778(cna@vuldb.com)
https://vuldb.com/?submit.747492(cna@vuldb.com)
https://www.dlink.com/(cna@vuldb.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.