A vulnerability was found in D-Link DIR-823X 250416. Affected by this issue is some unknown functionality of the file /goform/set_ac_status. Performing a manipulation of the argument ac_ipaddr/ac_ipstatus/ap_randtime results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.
Metrics
Affected Vendors & Products
References
History
Sun, 08 Feb 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in D-Link DIR-823X 250416. Affected by this issue is some unknown functionality of the file /goform/set_ac_status. Performing a manipulation of the argument ac_ipaddr/ac_ipstatus/ap_randtime results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used. | |
| Title | D-Link DIR-823X set_ac_status os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-08T01:32:08.746Z
Reserved: 2026-02-06T20:45:52.197Z
Link: CVE-2026-2129
No data.
Status : Received
Published: 2026-02-08T02:15:56.853
Modified: 2026-02-08T02:15:56.853
Link: CVE-2026-2129
No data.
OpenCVE Enrichment
No data.