A vulnerability, which was classified as problematic, was found in D-Link DIR-823X 240126/240802. This affects the function set_wifi_blacklists of the file /goform/set_wifi_blacklists of the component HTTP POST Request Handler. The manipulation of the argument macList leads to null pointer dereference. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://tasty-foxtrot-3a8.notion.site/D-link-DIR-823X-set_wifi_blacklists-Vulnerability-1870448e619580e5bf09cf628692f7a9?pvs=73 | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.294933 | Permissions Required Third Party Advisory VDB Entry |
| https://vuldb.com/?id.294933 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.489603 | Third Party Advisory |
| https://www.dlink.com/ | Product |
| https://tasty-foxtrot-3a8.notion.site/D-link-DIR-823X-set_wifi_blacklists-Vulnerability-1870448e619580e5bf09cf628692f7a9 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-02-07 15:15
Updated : 2025-05-21 16:51
NVD link : CVE-2025-1103
Mitre link : CVE-2025-1103
CVE.ORG link : CVE-2025-1103
JSON object : View
Products Affected
dlink
- dir-823x
- dir-823x_firmware
