58.1% probability · 98.2th percentile — 2026-05-12
Affected versions
All D-Link DIR-823X wireless router firmware versions
Summary
This command injection vulnerability impacts the D-Link DIR-823X wireless router. An authenticated attacker can send a malicious POST request to the router's management interface to execute arbitrary system commands. The affected product is likely end-of-life and will not receive an official security patch from D-Link.
Remediation
Replace end-of-life D-Link DIR-823X devices with a currently supported router model. If replacement is not immediate, disable public internet access to the router's management interface and restrict access only to trusted local networks. Follow CISA guidance for EOL device risk mitigation.
Exploit info
This exploit has been publicly disclosed, with references to this issue documented in trusted public vulnerability databases. You may check Exploit-DB or GitHub for potential exploit details.
TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.