PT-2026-1338 · D Link · Dsl-2640B +3
Vulncheck
·
Published
2026-01-05
·
Updated
2026-02-10
·
CVE-2026-0625
CVSS v4.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A |
Name of the Vulnerable Software and Affected Versions
D-Link DSL-2640B versions ≤ 1.07
D-Link DSL-2740R versions < 1.17
D-Link DSL-2780B versions ≤ 1.01.14
D-Link DSL-526B versions ≤ 2.01
D-Link DSL gateway devices (affected versions not specified)
Description
A critical remote code execution (RCE) vulnerability exists in multiple end-of-life D-Link DSL gateway routers. This flaw, tracked as CVE-2026-0625, is a command injection vulnerability located in the
dnscfg.cgi endpoint due to insufficient sanitization of user-supplied DNS configuration parameters. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary shell commands, potentially gaining full control of the device. This vulnerability has been observed in active exploitation campaigns, with attackers leveraging it for DNS hijacking, similar to past "GhostDNS" or "DNSChanger" attacks. The affected devices are no longer supported and will not receive security updates. Active exploitation of this vulnerability was observed as early as November 2025. The dnscfg.cgi endpoint is used for DNS configuration.Recommendations
D-Link DSL-2640B versions ≤ 1.07: Replace the device with a supported model.
D-Link DSL-2740R versions < 1.17: Replace the device with a supported model.
D-Link DSL-2780B versions ≤ 1.01.14: Replace the device with a supported model.
D-Link DSL-526B versions ≤ 2.01: Replace the device with a supported model.
D-Link DSL gateway devices (affected versions not specified): Replace the device with a supported model.
Fix
RCE
Missing Authentication
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2026-00124
CVE-2026-0625
Affected Products
Dsl-2640B
Dsl-2740R
Dsl-2780B
Dsl-526B
References · 66
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10488 · Vendor Advisory
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10068 · Patch, Vendor Advisory
- https://bdu.fstec.ru/vul/2026-00124 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2026-0625 · Security Note
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10118 · Vendor Advisory
- https://twitter.com/Cyberciaforge/status/2009160254005871057 · Twitter Post
- https://twitter.com/shah_sheikh/status/2008766373116436824 · Twitter Post
- https://twitter.com/unccno/status/2010108822724247992 · Twitter Post
- https://thehackernews.com/2026/01/active-exploitation-hits-legacy-d-link.html · Note
- https://reddit.com/r/SecOpsDaily/comments/1q66epk/ongoing_attacks_exploiting_critical_rce · Reddit Post
- https://t.me/thehackernews/8159 · Telegram Post
- https://twitter.com/HackingRabbitS/status/2009052546405409030 · Twitter Post
- https://reddit.com/r/TechNadu/comments/1q6herb/multiple_legacy_dlink_dsl_router_models_are · Reddit Post
- https://twitter.com/EduardKovacs/status/2008879872110936458 · Twitter Post
- https://twitter.com/ThreatSynop/status/2008900061116195245 · Twitter Post