CVE-2025-14208

MEDIUM

D-Link DIR-823X - Command Injection

Title source: llm
STIX 2.1

Description

A security flaw has been discovered in D-Link DIR-823X up to 20250416. This affects the function sub_415028 of the file /goform/set_wan_settings. The manipulation of the argument ppp_username results in command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.

References (6)

Core 6
Core References
Permissions Required, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.334651
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.334651
Permissions Required, VDB Entry third-party-advisory
https://vuldb.com/?submit.700499
Various Sources product
https://www.dlink.com/

Scores

CVSS v3 6.3
EPSS 0.0083
EPSS Percentile 74.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-74 CWE-77
Status published
Products (1)
dlink/dir-823x_firmware
Published Dec 08, 2025
Tracked Since Feb 18, 2026