


Perceptive Security
SOC/SIEM Consultancy

Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers
Published:
7 January 2026 at 04:31:00
Alert date:
7 January 2026 at 05:01:53
Source:
thehackernews.com
Mobile & IoT, Network Infrastructure, Zero-Day Vulnerabilities
A critical remote code execution vulnerability (CVE-2026-0625) with CVSS score 9.3 is being actively exploited in legacy D-Link DSL gateway routers. The flaw involves command injection in the dnscfg.cgi endpoint due to improper sanitization of user-supplied DNS configuration parameters. Unauthenticated remote attackers can exploit this vulnerability to execute arbitrary commands on affected devices.
Technical details
Critical command injection vulnerability in the dnscfg.cgi endpoint of legacy D-Link DSL routers caused by improper sanitization of user-supplied DNS configuration parameters. Allows unauthenticated remote attackers to inject and execute arbitrary shell commands, resulting in remote code execution. The vulnerability enables DNS hijacking and modification without credentials or user interaction, giving attackers control over DNS settings and ability to redirect, intercept, or block downstream traffic.
Mitigation steps:
Retire affected D-Link DSL devices and upgrade to actively supported devices that receive regular firmware and security updates. Organizations should discontinue use of end-of-life D-Link DSL models as they are unpatchable and face elevated operational risk.
Affected products:
D-Link DSL-2640B <= 1.07
D-Link DSL-2740R < 1.17
D-Link DSL-2780B <= 1.01.14
D-Link DSL-526B <= 2.01
Related links:
https://www.cve.org/CVERecord?id=CVE-2026-0625
https://www.vulncheck.com/advisories/dlink-dsl-command-injection-via-dns-configuration-endpoint
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10068
https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10488
https://fieldeffect.com/blog/legacy-d-link-routers-exploited-via-unauthenticated-dns-hijacking
Related CVE's:
Related threat actors:
IOC's:
dnscfg.cgi endpoint exploitation attempts, Exploitation attempts recorded by Shadowserver Foundation on November 27, 2025
This article was created with the assistance of AI technology by Perceptive.
