CVE-2025-11097

A vulnerability has been found in D-Link DIR-823X 250416. Impacted is an unknown function of the file /goform/set_device_name. The manipulation of the argument mac leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/n1ptune/dink/blob/main/set_device_name.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.326178 Permissions Required VDB Entry
https://vuldb.com/?id.326178 Third Party Advisory VDB Entry
https://vuldb.com/?submit.661913 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-823x_firmware:250416:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-823x:*:*:*:*:*:*:*:*

History

02 Oct 2025, 18:58

Type Values Removed Values Added
First Time Dlink
Dlink dir-823x
Dlink dir-823x Firmware
CPE cpe:2.3:o:dlink:dir-823x_firmware:250416:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-823x:*:*:*:*:*:*:*:*
References () https://github.com/n1ptune/dink/blob/main/set_device_name.md - () https://github.com/n1ptune/dink/blob/main/set_device_name.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.326178 - () https://vuldb.com/?ctiid.326178 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.326178 - () https://vuldb.com/?id.326178 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.661913 - () https://vuldb.com/?submit.661913 - Third Party Advisory, VDB Entry
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product

28 Sep 2025, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-28 05:15

Updated : 2025-10-02 18:58


NVD link : CVE-2025-11097

Mitre link : CVE-2025-11097

CVE.ORG link : CVE-2025-11097


JSON object : View

Products Affected

dlink

  • dir-823x
  • dir-823x_firmware
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')