Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2026-2129


A vulnerability was found in D-Link DIR-823X 250416. Affected by this issue is some unknown functionality of the file /goform/set_ac_status. Performing a manipulation of the argument ac_ipaddr/ac_ipstatus/ap_randtime results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.


Published

2026-02-08T02:15:56.853

Last Modified

2026-02-11T18:59:14.750

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.2 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:M/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: MULTIPLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

6.4

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-77
    CWE-78
  • Type: Primary
    CWE-78

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System dlink dir-823x_firmware 250416 Yes
Hardware dlink dir-823x - No

References