| Title | D-Link DIR-823X AX3000 <=250416 Command Injection |
|---|
| Description | The D-Link DIR-823x is a wireless router product released by D-Link Corporation. The D-Link DIR-823x contains a command execution vulnerability. This vulnerability stems from the file /usr/sbin/goahead failing to adequately validate input parameters when processing environment variables. An attacker could exploit this vulnerability by constructing malicious requests to execute arbitrary commands on the system. |
|---|
| Source | ⚠️ https://github.com/Cpppq43/D-Link/blob/main/D-Link%20DIR-823X%20AX3000.md |
|---|
| User | BediveRE (UID 89464) |
|---|
| Submission | 09/03/2025 07:56 (8 months ago) |
|---|
| Moderation | 09/13/2025 21:40 (11 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 323836 [D-Link DIR-823x up to 250416 /goform/diag_ping target_addr command injection] |
|---|
| Points | 19 |
|---|