Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

786+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability
CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability
SECURITYHIGHCVE-2025-29635

CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability

A command injection flaw in end-of-life D-Link DIR-823X routers allows authenticated remote attackers to execute arbitrary OS commands. CISA has added this CVE to the Known Exploited Vulnerabilities catalog, urging organizations to remove or isolate affected devices immediately.

Dylan H.

Security Team

April 25, 2026
3 min read

Affected Products

  • D-Link DIR-823X

Overview

CVE-2025-29635 is a command injection vulnerability affecting D-Link DIR-823X routers. An authorized attacker can exploit this flaw by sending a specially crafted POST request to the /goform/set_prohibiting endpoint, causing the router to execute arbitrary operating system commands with elevated privileges.

CISA added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog on April 24, 2026, confirming active exploitation in the wild.

Technical Details

FieldValue
CVE IDCVE-2025-29635
CVSS ScoreHigh
Affected ProductD-Link DIR-823X
Attack VectorNetwork
Authentication RequiredYes (authorized attacker)
Exploit MaturityActively exploited

Vulnerable Endpoint

The vulnerability resides in the router's web management interface. A POST request to /goform/set_prohibiting with a maliciously crafted parameter invokes a function that fails to properly sanitize user-supplied input before passing it to the underlying shell. This allows shell metacharacters to escape the intended context and execute arbitrary commands.

POST /goform/set_prohibiting HTTP/1.1
Host: <router-ip>
Content-Type: application/x-www-form-urlencoded

[malicious parameter with injected shell command]

End-of-Life Status

The D-Link DIR-823X is considered end-of-life (EoL) / end-of-service (EoS). D-Link has officially stated it will not release a security patch for this vulnerability, following its policy of not providing fixes for products beyond their support lifecycle.

This makes remediation straightforward but urgent: the device must be replaced or removed from internet-facing exposure.

Impact

Successful exploitation allows an attacker to:

  • Execute arbitrary OS commands on the router as a privileged user
  • Pivot into internal network segments reachable from the router
  • Modify DNS settings for traffic interception or redirect
  • Install persistent backdoors or botnet implants
  • Exfiltrate network credentials stored in the device

Routers with this vulnerability exposed to the internet are prime targets for botnet operators seeking to add devices to DDoS infrastructure or establish persistent footholds in home and small business networks.

CISA KEV Directive

Federal civilian agencies subject to BOD 22-01 are required to remediate KEV catalog entries within the specified timeframe. For EoL products with no available patch, the standard guidance is:

  1. Remove the device from service
  2. Replace with a supported model receiving active security updates
  3. Where replacement is delayed, isolate the device behind a firewall with no direct internet exposure

Recommendations

Immediate actions:

  • Replace the D-Link DIR-823X with a currently supported router model
  • Disable remote management / web admin interface if immediate replacement is not possible
  • Segment the device from sensitive network resources
  • Monitor for unusual outbound traffic or DNS changes that may indicate compromise
  • Audit similar end-of-life networking equipment across your environment

For organizations managing device fleets, treat any EoL router with a KEV-listed CVE as a critical remediation priority regardless of perceived network exposure. Attackers routinely scan for these devices and exploit them within hours of KEV publication.

References

  • CISA KEV Catalog — CVE-2025-29635
  • NVD Entry — CVE-2025-29635
  • D-Link EoL Product Policy
#Vulnerability#CVE#CISA KEV#D-Link#Router#Command Injection

Related Articles

CVE-2025-2749: Kentico Xperience Path Traversal Vulnerability

Kentico Xperience contains a path traversal vulnerability allowing an authenticated user's Staging Sync Server to upload arbitrary data to relative path locations — added to CISA KEV on April 20, 2026.

5 min read

CVE-2026-6112: Totolink A7100RU OS Command Injection via setRadvdCfg

A critical OS command injection vulnerability (CVSS 9.8) in Totolink A7100RU firmware allows unauthenticated remote attackers to execute arbitrary...

3 min read

CVE-2026-6113: Totolink A7100RU OS Command Injection via setTtyServiceCfg

A critical OS command injection flaw (CVSS 9.8) in Totolink A7100RU enables remote unauthenticated attackers to execute arbitrary commands by manipulating...

2 min read
Back to all Security Alerts