{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2084","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-06T08:15:49.330Z","datePublished":"2026-02-07T11:32:09.250Z","dateUpdated":"2026-02-23T09:31:45.636Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:31:45.636Z"},"title":"D-Link DIR-823X set_language os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"D-Link","product":"DIR-823X","versions":[{"version":"250416","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in D-Link DIR-823X 250416. This impacts an unknown function of the file /goform/set_language. Executing a manipulation of the argument langSelection can lead to os command injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":7.2,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.2,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":8.3,"vectorString":"AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-09T15:47:37.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"942384053 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.344651","name":"VDB-344651 | D-Link DIR-823X set_language os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.344651","name":"VDB-344651 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.746379","name":"Submit #746379 | D-Link DIR 250416 OS Command Injection","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.746380","name":"Submit #746380 | D-Link DIR-823X 250416 OS Command Injection (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/master-abc/cve/issues/24","tags":["exploit","issue-tracking"]},{"url":"https://www.dlink.com/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-10T15:44:22.892376Z","id":"CVE-2026-2084","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-10T15:44:44.127Z"}}]}}