CVE-2026-1125
Published: 18 January 2026
Description
A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_wifidog_settings. Executing a manipulation of the argument wd_enable can lead to command injection. The attack can be executed remotely. The…
more
exploit has been made available to the public and could be used for attacks.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents command injection by requiring validation of the malicious wd_enable argument in the /goform/set_wifidog_settings endpoint.
Mandates timely remediation of the specific command injection flaw in the sub_412E7C function through patching or updates.
Limits unauthenticated actions on sensitive endpoints like /goform/set_wifidog_settings, blocking remote unauthenticated exploitation.
Security SummaryAI
CVE-2026-1125 is a command injection vulnerability affecting the D-Link DIR-823X router on firmware version 250416. The flaw exists in the sub_412E7C function of the /goform/set_wifidog_settings file, where manipulation of the wd_enable argument enables arbitrary command execution. This issue, linked to CWE-74 and CWE-77, was published on 2026-01-18 and carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
The vulnerability is exploitable remotely by unauthenticated attackers requiring low complexity and no user interaction. By crafting a malicious request to the affected endpoint, an attacker can inject commands, achieving limited impacts on confidentiality, integrity, and availability of the device.
References include a GitHub repository containing a public exploit for the D-Link DIR-823X v250416 command execution vulnerability, along with VulDB entries detailing the issue (ctiid.341717, id.341717) and submission records. Security practitioners should review these sources for additional technical details, as specific vendor patch or mitigation guidance is not detailed in the core description.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables exploitation of public-facing web application (T1190) on router via unauthenticated command injection, facilitating arbitrary command execution on network device CLI (T1059.008).