{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4193","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-15T08:07:31.639Z","datePublished":"2026-03-15T23:02:10.715Z","dateUpdated":"2026-03-16T14:40:35.349Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-15T23:02:10.715Z"},"title":"D-Link DIR-823G goahead UpdateClientInfo access control","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"D-Link","product":"DIR-823G","versions":[{"version":"1.0.2B05","status":"affected"}],"modules":["goahead"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in D-Link DIR-823G 1.0.2B05. The affected element is the function GetDDNSSettings/GetDeviceDomainName/GetDeviceSettings/GetDMZSettings/GetFirewallSettings/GetGuestNetworkSettings/GetLanWanConflictInfo/GetLocalMacAddress/GetNetworkSettings/GetQoSSettings/GetRouterInformationSettings/GetRouterLanSettings/GetWanSettings/SetAccessCtlList/SetAccessCtlSwitch/SetDeviceSettings/SetGuestWLanSettings/SetIPv4FirewallSettings/SetNetworkSettings/SetNetworkTomographySettings/SetNTPServerSettings/SetRouterLanSettings/SetStaticClientInfo/SetStaticRouteSettings/SetWLanRadioSecurity/SetWPSSettings/UpdateClientInfo of the component goahead. Such manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:W/RC:UR"}}],"timeline":[{"time":"2026-03-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-15T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-15T09:12:43.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"pjqwudi (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.351105","name":"VDB-351105 | D-Link DIR-823G goahead UpdateClientInfo access control","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.351105","name":"VDB-351105 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.769835","name":"Submit #769835 | D-Link 1.0.2B05 Improper Access Controls","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.769836","name":"Submit #769836 | D-Link DIR823G 1.0.2B05 Improper Access Controls (Duplicate)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.769837","name":"Submit #769837 | D-Link DIR823G 1.0.2B05 Improper Access Controls (Duplicate)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.769838","name":"Submit #769838 | D-Link DIR823G 1.0.2B05 Improper Access Controls (Duplicate)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.769839","name":"Submit #769839 | D-Link DIR823G 1.0.2B05 Stack-based Buffer Overflow (Duplicate)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.769841","name":"Submit #769841 | D-Link DIR823G 1.0.2B05 Improper Access Controls (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_91/91.md","tags":["related"]},{"url":"https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_92/92.md","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-4193","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2026-03-16T14:33:07.803381Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-16T14:40:35.349Z"}}]}}