CVE-2026-2143 PUBLISHED

D-Link DIR-823X DDNS Service set_ddns os command injection

Assigner: VulDB
Reserved: 06.02.2026 Published: 08.02.2026 Updated: 08.02.2026

A security vulnerability has been detected in D-Link DIR-823X 250416. This issue affects some unknown processing of the file /goform/set_ddns of the component DDNS Service. The manipulation of the argument ddnsType/ddnsDomainName/ddnsUserName/ddnsPwd leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CVSS Score: 8.6

Product Status

Vendor D-Link
Product DIR-823X
Versions
  • Version 250416 is affected

Credits

  • jiefengliang (VulDB User) reporter

References

Problem Types

  • OS Command Injection CWE
  • Command Injection CWE