A vulnerability was detected in D-Link DIR-823x up to 250416. The affected element is an unknown function of the file /goform/diag_ping. Performing manipulation of the argument target_addr results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
History

Mon, 15 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 15 Sep 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-823
Vendors & Products D-link
D-link dir-823

Sun, 14 Sep 2025 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in D-Link DIR-823x up to 250416. The affected element is an unknown function of the file /goform/diag_ping. Performing manipulation of the argument target_addr results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
Title D-Link DIR-823x diag_ping command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-09-14T15:32:06.293Z

Updated: 2025-09-15T20:19:50.195Z

Reserved: 2025-09-13T19:40:00.810Z

Link: CVE-2025-10401

cve-icon Vulnrichment

Updated: 2025-09-15T20:19:46.827Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-14T16:15:32.393

Modified: 2025-09-15T15:21:42.937

Link: CVE-2025-10401

cve-icon Redhat

No data.