CVE-2026-2210
7.2 HIGHPublished 2026-02-09 · Modified 2026-02-09 · Awaiting Analysis
Quick Summary
A vulnerability in certain D-Link routers allows remote attackers to inject and execute operating system commands on the device. This is a serious flaw because it can give an attacker full control over the router.
Who is affected
Users of the D-Link DIR-823X router with firmware version 250416 are affected. An attacker could exploit this to take over the device, steal data, or launch further attacks on the network.
Recommended fix
Immediately check the D-Link security advisory for a firmware update and apply it. If no patch is available, disable remote administration (WAN access) to the router's web interface as a critical mitigation.
Technical Description
A vulnerability has been found in D-Link DIR-823X 250416. This affects the function sub_4211C8 of the file /goform/set_filtering. Such manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Details
Attack Vector
NETWORK
Complexity
LOW
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE
CWE-78, CWE-77