A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
References
| Link | Resource |
|---|---|
| https://github.com/Cpppq43/D-Link/blob/main/DIink-DIR-823x.md | Exploit Third Party Advisory |
| https://pan.baidu.com/s/1dWnXEa58P0KHw53L9U_PoQ | Broken Link |
| https://vuldb.com/?ctiid.324662 | Permissions Required VDB Entry |
| https://vuldb.com/?id.324662 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.650792 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
| https://github.com/Cpppq43/D-Link/blob/main/DIink-DIR-823x.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-09-18 02:15
Updated : 2025-09-24 18:42
NVD link : CVE-2025-10634
Mitre link : CVE-2025-10634
CVE.ORG link : CVE-2025-10634
JSON object : View
Products Affected
dlink
- dir-823x
- dir-823x_firmware
