Overview
The DIR-823X, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle. D-Link US recommends D-Link devices that have reached EOL/EOS, to be retired and replaced. Please contact your regional office for recommendations (LINK).
As a general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products cease. Please read information and recommendations below.
Report information
- Report #1: Adesh Nandkishor Kolte,
Offensive Security Engineer :: X.com (Twitter) https://x.com/AdeshKolte
Zokyolabs :: https://zokyo.io
- Summary: In this firmware version, the web server is not properly handling the ntp_zone_val
field in the CGI request for /goform/set_ntp
. This allows an attacker to craft a malicious ntp_zone_val
field and send a malicious HTTP request to the /goform/set_ntp
CGI, leading to command execution with administrator privileges on the firmware file system.
- Report #2: (09/09/2025) CVE-2025-10123: (link) - set_static_leases sub_415028 command injection
- Summary: A vulnerability was determined in D-Link DIR-823X up to 250416. Affected by this vulnerability is the function sub_415028 of the file /goform/set_static_leases. Executing manipulation of the argument Hostname can lead to command injection.
- Report #3: (09/14/2025) CVE-2025-10401: (link) - firmware sofware embedded function Diag_ping command injection
- Summary: A vulnerability was detected in D-Link DIR-823x up to 250416. The affected element is an unknown function of the file /goform/diag_ping. Performing manipulation of the argument target_addr results in command injection.
- Report #4: (09/18/2025) CVE-2025-10634: (link) - D-Link DIR-823X 240126 / 240802 / 250416 Environment Variable goahead sub_412E7C command injection
- Report #5: (09/22/2025) CVE-2025-10814: (link) - A vulnerability was determined in D-Link DIR-823X 240126/240802/250416. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/goahead. This manipulation of the argument port causes command injection.
- Report #6: (09/28/2025) CVE-2025-11092: (link) - A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_switch_settings. This manipulation of the argument port causes command injection.
- Report #7: (09/28/2025) CVE-2025-11095: (link) - A vulnerability was detected in D-Link DIR-823X 250416. This vulnerability affects unknown code of the file /goform/delete_offline_device. Performing manipulation of the argument delvalue results in command injection.
- Report #8: (09/28/2025) CVE-2025-11096: (link) - AA flaw has been found in D-Link DIR-823X 250416. This issue affects some unknown processing of the file /goform/diag_traceroute. Executing manipulation of the argument target_addr can lead to command injection.
- Report #9: (09/28/2025) CVE-2025-11097: (link) - A vulnerability has been found in D-Link DIR-823X 250416. Impacted is an unknown function of the file /goform/set_device_name. The manipulation of the argument mac leads to command injection.
- Report #10: (09/28/2025) CVE-2025-11098: (link) - A vulnerability was found in D-Link DIR-823X 250416. The affected element is an unknown function of the file /goform/set_wifi_blacklists. The manipulation of the argument macList results in command injection.
- Report #11: (09/28/2025) CVE-2025-11100: (link) - A vulnerability was identified in D-Link DIR-823X 250416. This affects the function uci_set of the file /goform/set_wifi_blacklists. Such manipulation leads to command injection.
Affected Models
Model
|
Region
|
Hardware Revision
|
End of Support
|
Legacy Website
|
Last Updated
|
DIR-823X
|
Worldwide
|
All Series H/W Revisions
|
11/15/24 |
No, Non-US |
09/29/2025
|
Recommendation for End of Support /End of Life Products
From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to the evolution of technology, market demands, new innovations, product efficiencies based on the latest technologies, or the product's maturity over time, which necessitates replacement with functionally superior technology.
For US Consumer
If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is usually no further extended support or development for it.
Typically for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased.
D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please ensure the device has the most recent firmware, update its unique password frequently to access its web-configuration, and always enable WIFI encryption with a unique password.
temp