Command Injection Vulnerability in D-Link DIR-823X Router
CVE-2025-11096
Key Information:
Badges
What is CVE-2025-11096?
A security flaw exists in the D-Link DIR-823X router that affects the processing of requests to the file /goform/diag_traceroute. An attacker may exploit this vulnerability by manipulating the target_addr argument, allowing for remote command injection. This could enable an unauthorized user to execute arbitrary commands on the affected device, posing significant risks to network security. It is essential for users of the affected product to apply the necessary updates or mitigations to protect against potential exploitation.
Affected Version(s)
DIR-823X 250416
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved