Unrated severityNVD Advisory· Published Feb 8, 2026· Updated Feb 23, 2026
D-Link DIR-823X set_ac_status os command injection
CVE-2026-2129
Description
A vulnerability was found in D-Link DIR-823X 250416. Affected by this issue is some unknown functionality of the file /goform/set_ac_status. Performing a manipulation of the argument ac_ipaddr/ac_ipstatus/ap_randtime results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.
Affected products
2- D-Link/DIR-823Xv5Range: 250416
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/master-abc/cve/issues/23mitreexploitissue-tracking
- vuldb.commitrethird-party-advisory
- vuldb.commitresignaturepermissions-required
- vuldb.commitrevdb-entrytechnical-description
- www.dlink.commitreproduct
News mentions
0No linked articles in our index yet.