TopVuln

High-risk vulnerability digests

CVE-2025-29635

  • HIGH
  • KEV

D-Link DIR-823X Command Injection Vulnerability

Details

CVSS v3
7.2
NVD published
2025-03-25 14:15:29
CISA date
2026-04-24
EPSS
58.1% probability · 98.2th percentile — 2026-05-12
Affected versions
All D-Link DIR-823X wireless router firmware versions
Summary
This command injection vulnerability impacts the D-Link DIR-823X wireless router. An authenticated attacker can send a malicious POST request to the router's management interface to execute arbitrary system commands. The affected product is likely end-of-life and will not receive an official security patch from D-Link.
Remediation
Replace end-of-life D-Link DIR-823X devices with a currently supported router model. If replacement is not immediate, disable public internet access to the router's management interface and restrict access only to trusted local networks. Follow CISA guidance for EOL device risk mitigation.
Exploit info
This exploit has been publicly disclosed, with references to this issue documented in trusted public vulnerability databases. You may check Exploit-DB or GitHub for potential exploit details.

View on NVD  ·  CISA KEV catalog

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.