CVE-2026-2210

7.2 HIGH

Published 2026-02-09 · Modified 2026-02-09 · Awaiting Analysis

Quick Summary

A vulnerability in certain D-Link routers allows remote attackers to inject and execute operating system commands on the device. This is a serious flaw because it can give an attacker full control over the router.

Who is affected

Users of the D-Link DIR-823X router with firmware version 250416 are affected. An attacker could exploit this to take over the device, steal data, or launch further attacks on the network.

Recommended fix

Immediately check the D-Link security advisory for a firmware update and apply it. If no patch is available, disable remote administration (WAN access) to the router's web interface as a critical mitigation.

Technical Description

A vulnerability has been found in D-Link DIR-823X 250416. This affects the function sub_4211C8 of the file /goform/set_filtering. Such manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS Details

Attack Vector

NETWORK

Complexity

LOW

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CWE

CWE-78, CWE-77

References