Command Injection Vulnerability in D-Link DIR-823X Products
CVE-2025-29635

7.2HIGH

Key Information:

Vendor

D-Link

Status
Vendor
CVE Published:
25 March 2025

Badges

πŸ‘Ύ Exploit Exists🟣 EPSS 69%πŸ¦… CISA ReportedπŸ“° News Worthy

What is CVE-2025-29635?

A command injection vulnerability exists in the D-Link DIR-823X series, specifically affecting versions 240126 and 240802. This flaw allows an authorized attacker to execute arbitrary commands on the affected devices by sending specially crafted POST requests to the /goform/set_prohibiting endpoint. If exploited, this vulnerability enables the attacker to gain unauthorized access and control over potentially sensitive functions, posing significant risks to system integrity and user confidentiality.

CISA has reported CVE-2025-29635

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-29635 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

News Articles

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

CISA adds 4 exploited CVEs including CVSS 9.9 SimpleHelp flaw, mandating FCEB mitigation by May 8, 2026 to reduce ransomware and botnet risk.

5 days ago

New Mirai campaign exploits RCE flaw in EoL D-Link routers

A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.

1 week ago

References

EPSS Score

69% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ¦…

    CISA Reported

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by BleepingComputer

  • Vulnerability published

  • Vulnerability Reserved

.