• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10463
(non-US) DIR-823X :: Rev. Ax :: F/W 固件-250416 :: Multiple Vulnerabilities Reported
Publication ID: SAP10463
Resolved Status: Open
Published on: 16 September 2025 2:45 GMT
Last updated on: 16 September 2025 3:00 GMT

Overview

 

On September 9, 2025, D-Link became aware of CVE-2025-10123: an Command Infjection vulnerability in the (Non-US) DIR-823X Hardware Revision Ax, Firmware version 250416.

 

 

D-Link Corporation recognizes the security issue and is in process of developing patches for the issue.

 

 

D-Link takes network security and user privacy very seriously. We have a dedicated task force and product management team on call to address evolving security issues and implement appropriate security measures.

 

Report Information  

 

         - Report 1: (09/09/2025CVE-2025-10123: (link) - set_static_leases sub_415028 command injection



                     - Summary

 

                        A vulnerability was determined in D-Link DIR-823X up to 250416. Affected by this vulnerability is the function sub_415028 of the file /goform/set_static_leases. Executing manipulation of the argument Hostname can lead to command injection. 

 

         - Report 2: (09/14/2025CVE-2025-10401: (link) - firmware sofware embedded function Diag_ping command injection



                     - Summary

 

                       A vulnerability was detected in D-Link DIR-823x up to 250416. The affected element is an unknown function of the file /goform/diag_ping. Performing manipulation of the argument target_addr results in command injection.

 

 

Affected Models

 

 

Model

 

Software Version

 

 Region

 

Fixed Release

 

 Last Updated

DIR-823X

v 240416

(Non-US)

Pending Information update

from D-Link Corporation

09/09/2024

 

 

 Regarding the Security Update for Your D-Link Device

 

Installing software updates is critical in addressing security vulnerabilities in your D-Link devices. D-Link strongly urges all users to install the relevant updates and regularly check for further updates. After downloading the software update, it is essential to ALWAYS validate its success by comparing the software version on your product interface to the software update version.

 

Please note that beta software, beta firmware, or a hot-fix release is still undergoing rigorous testing before its official release. This ensures that the software is of the highest quality and meets our stringent standards. However, it is essential to understand that the user assumes all risk and liability for its use. D-Link does not provide express or implied warranties regarding the suitability or usability of the beta software, beta firmware, or hot-fix release. D-Link will not be liable for any direct, indirect, special, or consequential loss suffered by any party due to their use of the beta firmware, beta software, or hit-fix release.

 

NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.