CVE-2026-2175

7.2 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in D-Link DIR-823X routers that allows remote attackers to execute arbitrary commands on affected devices. The vulnerability exists in the UPnP configuration function and can be exploited without authentication. All users of affected D-Link DIR-823X routers are at risk.

💻 Affected Systems

Products:
  • D-Link DIR-823X
Versions: Firmware version 250416
Operating Systems: Embedded Linux/RTOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific firmware version mentioned; other versions may also be vulnerable but unconfirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent backdoors, pivot to internal networks, or use device in botnets.

🟠

Likely Case

Remote code execution leading to device takeover, credential theft, or network reconnaissance.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted inbound access.

🌐 Internet-Facing: HIGH - Remote exploitation is possible and public exploit exists.
🏢 Internal Only: HIGH - Even internal attackers can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit available on GitHub, making this easily exploitable by attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.dlink.com/

Restart Required: Yes

Instructions:

1. Check D-Link website for firmware updates
2. Download latest firmware for DIR-823X
3. Upload via web interface
4. Reboot router after update

🔧 Temporary Workarounds

Disable UPnP Service

all

Disable Universal Plug and Play service to prevent exploitation via vulnerable endpoint

Access router web interface -> Advanced -> UPnP -> Disable

Restrict Web Interface Access

all

Limit access to router administration interface to trusted IPs only

Access router web interface -> Firewall -> Access Control -> Restrict admin access

🧯 If You Can't Patch

  • Place router behind firewall with strict inbound rules blocking port 80/443
  • Segment affected routers on isolated network VLAN

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under System -> Firmware

Check Version:

curl -s http://router-ip/status.html | grep Firmware

Verify Fix Applied:

Verify firmware version is newer than 250416 and test UPnP functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/set_upnp
  • Suspicious command execution in system logs

Network Indicators:

  • Unexpected outbound connections from router
  • Port scanning originating from router

SIEM Query:

source="router-logs" AND uri="/goform/set_upnp" AND (upnp_enable="*;*" OR upnp_enable="*|*" OR upnp_enable="*`*")

🔗 References

📤 Share & Export