{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1685","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-30T07:40:40.236Z","datePublished":"2026-01-30T14:32:10.501Z","dateUpdated":"2026-02-23T09:08:58.947Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:08:58.947Z"},"title":"D-Link DIR-823X Login sub_40AC74 excessive authentication","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-307","lang":"en","description":"Improper Restriction of Excessive Authentication Attempts"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-799","lang":"en","description":"Improper Control of Interaction Frequency"}]}],"affected":[{"vendor":"D-Link","product":"DIR-823X","versions":[{"version":"250416","status":"affected"}],"modules":["Login"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_40AC74 of the component Login. Such manipulation leads to improper restriction of excessive authentication attempts. The attack may be performed from remote. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.7,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.7,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.6,"vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-30T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-30T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-20T17:25:24.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"942384053 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.343479","name":"VDB-343479 | D-Link DIR-823X Login sub_40AC74 excessive authentication","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.343479","name":"VDB-343479 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.740886","name":"Submit #740886 | D-Link dir-823X 250416 A logical flaw in the authentication mechanism exists","tags":["third-party-advisory"]},{"url":"https://github.com/master-abc/cve/issues/17","tags":["exploit","issue-tracking"]},{"url":"https://www.dlink.com/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-30T14:55:21.865385Z","id":"CVE-2026-1685","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-30T14:55:54.845Z"}}]}}