Cyber Posture

CVE-2025-29635

HighCISA KEVActive ExploitationPublic PoCRCE

Published: 25 March 2025

Published
25 March 2025
Modified
24 April 2026
KEV Added
24 April 2026
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.6572 98.5th percentile
Risk Priority 74 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-29635 is a high-severity Command Injection (CWE-77) vulnerability in Dlink Dir-823X Firmware. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 1.5% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

preventrecover

Requires timely remediation of the specific command injection flaw in D-Link DIR-823X firmware versions 240126 and 240802 to eliminate the vulnerability.

prevent

Mandates validation and sanitization of inputs to the /goform/set_prohibiting POST endpoint to directly block command injection attacks.

detect

Enables detection of firmware modifications or integrity violations resulting from exploitation, such as Mirai botnet infections.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in web management endpoint (/goform/set_prohibiting) on exposed router enables exploitation of public-facing application for initial access (T1190) and arbitrary command execution via Unix shell (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution.

Deeper analysisAI

CVE-2025-29635 is a command injection vulnerability (CWE-77) affecting D-Link DIR-823X routers running firmware versions 240126 and 240802. It enables an authorized attacker to execute arbitrary commands on the targeted device by sending a specially crafted POST request to the /goform/set_prohibiting endpoint through the associated function, resulting in remote command execution. The vulnerability carries a CVSS v3.1 base score of 7.2 (High), reflecting network accessibility, low attack complexity, high required privileges, no user interaction, unchanged scope, and high impacts on confidentiality, integrity, and availability.

An attacker with high privileges, such as administrative access to the device, can exploit this vulnerability over the network with low complexity and no need for user interaction. Successful exploitation grants remote command execution on the router, potentially allowing full compromise of the device, including data exfiltration, modification of configurations, or disruption of services.

Advisories reference a GitHub repository detailing the vulnerability at https://github.com/mono7s/Dir-823x/blob/main/set_prohibiting/set_prohibiting.md, an Akamai security research blog at https://www.akamai.com/blog/security-research/2026/apr/cve-2025-29635-mirai-campaign-targets-d-link-devices, and CISA's Known Exploited Vulnerabilities catalog entry at https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-29635, which collectively highlight exploitation details and urge mitigation through patching or configuration hardening where available.

In notable context, the vulnerability has seen real-world exploitation, including targeting by a Mirai botnet campaign as documented by Akamai, and its inclusion in CISA's Known Exploited Vulnerabilities catalog indicates active exploitation in the wild.

Details

CWE(s)
KEV Date Added
24 April 2026

Affected Products

dlink
dir-823x firmware
240126, 240802

Threat-Actor AttributionAI

Mirai
Akamai reported a Mirai campaign exploiting CVE-2025-29635 to target D-Link DIR-823X devices.

CVEs Like This One

CVE-2026-2175Same product: Dlink Dir-823X
CVE-2026-2210Same product: Dlink Dir-823X
CVE-2026-2081Same product: Dlink Dir-823X
CVE-2026-2157Same product: Dlink Dir-823X
CVE-2026-2063Same product: Dlink Dir-823X
CVE-2026-2129Same product: Dlink Dir-823X
CVE-2026-2143Same product: Dlink Dir-823X
CVE-2026-2155Same product: Dlink Dir-823X
CVE-2025-10634Same product: Dlink Dir-823X
CVE-2026-2142Same product: Dlink Dir-823X

References