Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Feb 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 30 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink dir-823x Dlink dir-823x Firmware |
|
| CPEs | cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-823x_firmware:250126:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink dir-823x Dlink dir-823x Firmware |
Tue, 20 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 19 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link dir-823x |
|
| Vendors & Products |
D-link
D-link dir-823x |
Sun, 18 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_wifidog_settings. Executing a manipulation of the argument wd_enable can lead to command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. | |
| Title | D-Link DIR-823X set_wifidog_settings sub_412E7C command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T08:39:23.157Z
Reserved: 2026-01-17T18:18:14.233Z
Link: CVE-2026-1125
Updated: 2026-01-20T16:41:40.353Z
Status : Modified
Published: 2026-01-18T16:15:50.810
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-1125
No data.
OpenCVE Enrichment
Updated: 2026-04-18T05:30:25Z