| Title | dlink DIR-823X 250416 OS Command Injection |
|---|
| Description | D-Link DIR-823X is a wireless router widely used in home and office environments. A critical security vulnerability exists in the web management interface at the /goform/set_ac_server endpoint. Due to improper validation of the ac_server parameter, an authenticated attacker can bypass the blacklist filter using a newline character (\n) to execute arbitrary system commands with root privileges. |
|---|
| Source | ⚠️ https://github.com/master-abc/cve/issues/19 |
|---|
| User | jiefengliang (UID 93721) |
|---|
| Submission | 01/22/2026 18:41 (3 months ago) |
|---|
| Moderation | 02/06/2026 07:40 (15 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 344623 [D-Link DIR-823X 250416 Web Management Interface /goform/set_ac_server os command injection] |
|---|
| Points | 20 |
|---|