A vulnerability, which was classified as critical, has been found in D-Link DIR-823X 240126/240802. This issue affects the function sub_41710C of the file /goform/diag_nslookup of the component HTTP POST Request Handler. The manipulation of the argument target_addr leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/mono7s/Dir-823x/blob/main/diag_nslookup/diag_nslookup.md | Broken Link |
| https://vuldb.com/?ctiid.300737 | Permissions Required Third Party Advisory VDB Entry |
| https://vuldb.com/?id.300737 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.517958 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
| https://github.com/mono7s/Dir-823x/blob/main/diag_nslookup/diag_nslookup.md | Broken Link |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-03-25 00:15
Updated : 2025-05-21 16:51
NVD link : CVE-2025-2717
Mitre link : CVE-2025-2717
CVE.ORG link : CVE-2025-2717
JSON object : View
Products Affected
dlink
- dir-823x
- dir-823x_firmware
