- Description
- A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution.
- Source
- cve@mitre.org
- NVD status
- Analyzed
- Products
- dir-823x_firmware
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-77
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
5
Mirai Botnet Exploits D-Link Router Flaw CVE-2025-29635 #cve202529635 #dlinkrouter #miraibotnet
@kaxm231
22 Apr 2026
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Mirai Botnet Exploits D-Link Router Flaw CVE-2025-29635 #cve202529635 #dlinkrouter #miraibotnet https://t.co/nUST8rUEHP
@Anavem_
22 Apr 2026
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Mirai hits CVE-2025-29635 in EOL D-Link DIR-823X routers a year after PoC. No patch - forever-day IoT. https://t.co/l4ZEciMxh3 #infosec #IoT #Mirai
@CyberDaily_News
22 Apr 2026
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 BREAKING: #BreakingNews Mirai botnet exploits CVE-2025-29635 command-injection flaw in EOL D-Link DIR-823X routers via crafted POST requests to build botnet. Akamai SIRT observed active attacks.[127 chars] #DLink #Mirai #Cybersecurity https://t.co/B7RzL9EvHJ
@Archange_Shadow
22 Apr 2026
4 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
New Mirai-based campaign exploits CVE-2025-29635, a high-severity command-injection flaw in EOL D-Link DIR-823X routers, turning affected devices into a botnet. Learn more: https://t.co/zZ4T8RrmQJ
@trubetech
22 Apr 2026
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A revived Mirai botnet campaign is exploiting CVE-2025-29635 to compromise legacy D-Link routers, turning outdated devices into powerful tools for large-scale cyberattacks. https://t.co/vn9cgURtey
@rfeio
22 Apr 2026
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Mirai botnet exploits D-Link routers (CVE-2025-29635) Command injection → malware drop + botnet recruitment 💡 Lesson: Old vulnerabilities + public PoC = easy targets for botnet operators ⚠️ Action: Replace unsupported devices, patch immediately, and block suspici
@VivekIntel
22 Apr 2026
101 Impressions
0 Retweets
2 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 Mirai Botnet Exploits #CVE-2025-29635 in Discontinued D-Link Routers to Deploy Global #Malware Campaign + Video -Fact Checker: ✅: 3 ❌: 0 || 3/3 https://t.co/eEgm4L3XIb
@UndercodeNews
22 Apr 2026
58 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Los cadáveres de silicio nunca descansan en paz; simplemente esperan a ser reclamados por una mente superior. 👁️ El botnet Mirai ha vuelto a las arterias de la red, despertando a los routers D-Link que la industria ya dio por muertos en 2025. El CVE-2025-29635 no es un sim
@ZamnaX_89
22 Apr 2026
44 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Mirai Botnet exploits CVE-2025-29635 to target legacy D-Link routers https://t.co/5fgyv4x3vI
@hackplayers
22 Apr 2026
238 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Mirai Botnet exploits CVE-2025-29635 to target legacy D-Link routers: Mirai botnet is targeting old D-Link routers using CVE-2025-29635, a command injection flaw exploitable via crafted POST requests after public PoC disclosure. A Mirai botnet is… https://t.co/txN6cNNP2r https:
@shah_sheikh
22 Apr 2026
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
@Akamai #Mirai #Botnet exploits CVE-2025-29635 to target legacy D-Link routers https://t.co/D2hM9rLcGz #securityaffairs #hacking #malware
@securityaffairs
22 Apr 2026
87 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-29635: Mirai Botnet Hits Retired D-Link DIR-823X Routers https://t.co/7eGZLLIhco #CVE202529635 #MiraiBotnet #CyberSecurity
@cybrsecpath
22 Apr 2026
53 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
يستهدف بوتنت Mirai ثغرة في راوترات D-Link المتوقفة (CVE-2025-29635)، ما يسمح بتنفيذ أوامر عن بُعد عبر طلبات معدلة، مع تحذيرات بضرورة استبدال الأجهزة فورًا لتجنب الاخت
@Malathknet
22 Apr 2026
65 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Akamai SIRT warns of a new Mirai campaign weaponizing EOL D-Link routers via CVE-2025-29635. Protect your network from zombie botnets—retire old hardware now. #MiraiBotnet #DLink #CyberSecurity #IoT #CVE202529635 #InfoSec #Botnet #DDoS https://t.co/9LCaqXy9Sy https://t.co/Aff4
@the_yellow_fall
22 Apr 2026
382 Impressions
4 Retweets
6 Likes
3 Bookmarks
1 Reply
0 Quotes
NEW THREAT INTEL: Mirai Variant Hits D-Link DIR-823X - CVE-2025-29635 command injection recruits SOHO routers into DDoS botnet. 9 detections, 23 IOCs. https://t.co/xw1w7TkP9O #ThreatIntel #CyberSecurity #Mirai #Botnet #CVE
@threadlinqs
22 Apr 2026
127 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 [HIGH] Active exploitation detected: CVE-2025-29635 Exploit in the wild confirmed for CVE-2025-29635 (CVSS null). A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authori... 🔗 https://t.co/RZBhpWnHFz #ZeroDay #ExploitInWild #CyberSecurity
@ctiwatchcloud
22 Apr 2026
132 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
👁️👁️ CVE-2025-29635: Mirai Campaign Targets D-Link Devices | Akamai https://t.co/YyBya7rhIs
@fj_twt
21 Apr 2026
250 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-29635 Mirai campaign targets D-Link devices -- https://t.co/2tlsJiFHq6
@AndreGironda
21 Apr 2026
165 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 D-Link DIR-823X, Command Injection, #CVE-2025-29635 (Critical) https://t.co/CawXIvHzgN
@dailycve
3 Apr 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-29635 🔴 HIGH (8.8) 🏢 Unknown Vendor - Unknown Product 🏗️ Unknown Version 🔗 https://t.co/haG2bN2Uk6 #CyberCron #VulnAlert #InfoSec https://t.co/yjW0m7Al7s
@cybercronai
26 Mar 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-29635 🔴 HIGH (8.8) 🏢 Unknown Vendor - Unknown Product 🏗️ Unknown Version 🔗 https://t.co/haG2bN2Uk6 #CyberCron #VulnAlert #InfoSec https://t.co/Jn5jvREuMM
@cybercronai
25 Mar 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
New post from https://t.co/uXvPWJy6tj (CVE-2025-29635 | D-Link DIR-823X HTTP POST Request /goform/set_prohibiting command injection) has been published on https://t.co/A0fDzJb13m
@WolfgangSesin
25 Mar 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-29635 A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST… https://t.co/8cDWK7QqV2
@CVEnew
25 Mar 2025
340 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-823x_firmware:240126:*:*:*:*:*:*:*",
"matchCriteriaId": "3C63FF02-C46A-4DD9-AEB0-72FF5D4C2ABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:dlink:dir-823x_firmware:240802:*:*:*:*:*:*:*",
"matchCriteriaId": "692189D6-6D75-4C87-BA1F-15D9C34FAEF6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09CE2627-49F3-4B6F-B48B-F52665C6B8C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
]