HIGHVulnerability
Verified
Global

CISA KEV: D-Link DIR-823X — D-Link DIR-823X Command Injection Vulnerability

·Source: CISA KEV

Updated:

Executive Summary

D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Analysis

D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. Added to CISA Known Exploited Vulnerabilities catalog on 2026-04-24. Remediation due: 2026-05-08.

Indicators of Compromise (1)

CVE (1)
CVE-2025-29635
Source Attribution

Originally published by CISA KEV on Apr 24, 2026. Verified by: CISA.

Related Threats