CVE-2026-2063
Unknown Unknown - Not Provided
OS Command Injection in D-Link DIR-823X Web Management Interface

Publication date: 2026-02-06

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in D-Link DIR-823X 250416. This vulnerability affects unknown code of the file /goform/set_ac_server of the component Web Management Interface. The manipulation of the argument ac_server results in os command injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-06
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-02-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dlink dir-823x_firmware 250416
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-2063 is a remote OS command injection vulnerability in the D-Link DIR-823X router's web management interface, specifically at the /goform/set_ac_server endpoint."}, {'type': 'paragraph', 'content': 'The vulnerability arises because the input parameter ac_server is not properly validated. The blacklist filter used to block dangerous characters does not include newline characters (\\n), which in Linux shells act as command separators.'}, {'type': 'paragraph', 'content': 'An authenticated attacker can inject a newline character to terminate the intended command and start a new arbitrary command, which is executed with root privileges on the device.'}, {'type': 'paragraph', 'content': 'This flaw allows attackers to execute arbitrary system commands remotely on the affected router.'}] [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability allows an authenticated remote attacker to execute arbitrary commands with root privileges on the affected D-Link DIR-823X router.

  • Compromise of device confidentiality by accessing sensitive information.
  • Integrity violations by modifying system configurations or data.
  • Availability impact by executing commands that disrupt normal device operation.

Because the attacker gains root-level access, the entire device and potentially the network it manages can be compromised.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability can be detected by attempting to exploit the command injection flaw in the /goform/set_ac_server endpoint of the D-Link DIR-823X router's web management interface. A common detection method involves sending a specially crafted request with the ac_server parameter containing a newline character followed by a benign command such as 'sleep 3'. If the response time is delayed accordingly, it indicates successful command injection."}, {'type': 'paragraph', 'content': "A practical approach is to authenticate to the router's web interface and then send a request to /goform/set_ac_server with a payload like: ac_server=valid_input\\nsleep 3. Measuring the response delay can confirm the vulnerability."}, {'type': 'paragraph', 'content': 'No specific ready-made commands are provided, but the proof-of-concept involves using scripts (e.g., Python) to automate authentication and send the payload to test for command injection.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': "Immediate mitigation steps include restricting access to the router's web management interface to trusted users only, ensuring strong authentication to prevent unauthorized access."}, {'type': 'paragraph', 'content': 'It is recommended to avoid using the vulnerable /goform/set_ac_server endpoint or disable the web management interface if possible until a patch is available.'}, {'type': 'paragraph', 'content': 'Longer-term mitigations suggested include expanding the blacklist of forbidden characters in the input validation to include newline (\\n), carriage return (\\r), and other shell metacharacters such as $, &, |, >, and <.'}, {'type': 'paragraph', 'content': 'Replacing vulnerable system calls with secure APIs like parameterized execution functions (e.g., execve()) or using native UCI library APIs to modify configurations without invoking a shell is advised to eliminate the command injection vector.'}, {'type': 'paragraph', 'content': 'If no patch is available, consider replacing the affected product with an alternative device not vulnerable to this issue.'}] [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart