首页 CVE-2026-2129 神龙十问摘要 CVE-2026-2129 — 神龙十问 AI 深度分析摘要 更新于 2026-02-08 CVSS 7.2 · High
本页是神龙十问 AI 深度分析的
摘要版 。完整版(更长回答、追问、相关漏洞)需
登录查看 → Q1 这个漏洞是什么?(本质+后果) **🚨 OS Command Injection in D-Link DIR-823X** - Vulnerable endpoint: `/goform/set_ac_status` - **Consequence**: Remote attackers can execute arbitrary OS commands via crafted parameters. - **Impact**: Full system comprom…
Q2 根本原因?(CWE/缺陷点) **🔍 Root Cause: CWE-77 - Improper Neutralization of Special Elements** - Parameters `ac_ipaddr`, `ac_ipstatus`, `ap_randtime` are not sanitized. - Malicious input injected into system calls → command execution. - **Flaw*…
Q3 影响谁?(版本/组件) **⚠️ Affected Devices** - **Model**: D-Link DIR-823X - **Firmware**: 250416 (specific version) - **Component**: `/goform/set_ac_status` endpoint - **No other versions listed** 📦
Q4 黑客能干啥?(权限/数据) **🔓 Hacker Capabilities** - **Remote execution** without user interaction. - Can access files, steal data, install malware. - **Full control** over device (C:H/I:H/A:H) 💣
Q5 利用门槛高吗?(认证/配置) **🔐 Exploitation Threshold: High Privilege Required?** - **CVSS: PR:H** → High privilege needed. - **But**: Remote attack possible (AV:N) 🌐 - **No authentication bypass mentioned** 🚫
Q6 有现成Exp吗?(PoC/在野利用) **📌 Public Exploit?** - **Yes!** PoC referenced in GitHub issue #23 (exploit|issue-tracking) - **Exploitation in wild?** Possibly — advisory mentions "may be exploited" 🕵️♂️
Q7 怎么自查?(特征/扫描) **🔍 Self-Check Methods** - Scan for `set_ac_status` endpoint on DIR-823X devices. - Check firmware version: **250416**. - Use tools like `nmap`, `curl` to probe `/goform/set_ac_status` 📊
Q8 官方修了吗?(补丁/缓解) **🛠️ Official Fix?** - **No patch mentioned** in provided data. - D-Link product link included, but no advisory or firmware update referenced. 🚫
Q9 没补丁咋办?(临时规避) **🛡️ Workarounds (No Patch)** - **Disable remote access** to `/goform/set_ac_status`. - **Firewall rules**: Block external access to device’s admin port. - **Network segmentation**: Isolate router from internal network.…
Q10 急不急?(优先级建议) **❗ Urgency: HIGH** - **CVSS: 9.1/10** (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) - Public exploit exists. - **Critical for exposed devices** — patch ASAP or isolate. ⚠️