PT-2026-1338 · D Link · Dsl-526B +3
Vulncheck
·
Published
2026-01-05
·
Updated
2026-01-08
·
CVE-2026-0625
CVSS v4.0
9.3
9.3
Critical
| Base vector | Vector | AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A |
Name of the Vulnerable Software and Affected Versions
D-Link DSL-2640B version 1.07 and earlier
D-Link DSL-2740R version 1.17 and earlier
D-Link DSL-2780B version 1.01.14 and earlier
D-Link DSL-526B version 2.01 and earlier
D-Link DSL routers (affected versions not specified)
Description
Multiple D-Link DSL gateway devices contain a command injection vulnerability in the
dnscfg.cgi endpoint due to insufficient sanitization of user-supplied DNS configuration parameters. This allows an unauthenticated remote attacker to inject and execute arbitrary shell commands, resulting in remote code execution. The vulnerability has been actively exploited in the wild since November 2025, with exploitation patterns resembling previous DNS hijacking campaigns (such as "GhostDNS" or "DNSChanger"). Many affected devices are end-of-life and no longer receive security updates. The estimated number of potentially affected devices is not specified. Exploitation of this flaw can lead to full network compromise, traffic redirection, and potential botnet recruitment. The dnscfg.cgi endpoint is used for DNS configuration.Recommendations
For DSL-2640B version 1.07 and earlier, replace the device with a supported model.
For DSL-2740R version 1.17 and earlier, replace the device with a supported model.
For DSL-2780B version 1.01.14 and earlier, replace the device with a supported model.
For DSL-526B version 2.01 and earlier, replace the device with a supported model.
For all other affected D-Link DSL routers, replace the device with a supported model.
Fix
RCE
Missing Authentication
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
CVE-2026-0625
Affected Products
Dsl-2640B
Dsl-2740R
Dsl-2780B
Dsl-526B
References · 53
- https://nvd.nist.gov/vuln/detail/CVE-2026-0625 · Security Note
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10488 · Vendor Advisory
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10068 · Patch, Vendor Advisory
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10118 · Vendor Advisory
- https://twitter.com/NovaSignal/status/2008955313014321626 · Twitter Post
- https://twitter.com/transilienceai/status/2009143124082192483 · Twitter Post
- https://vulncheck.com/advisories/dlink-dsl-command-injection-via-dns-configuration-endpoint · Note
- https://twitter.com/dailytechonx/status/2009334795990397048 · Twitter Post
- https://twitter.com/securityRSS/status/2008925798997119421 · Twitter Post
- https://twitter.com/ritzsec/status/2009171408061124816 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1q634kk/new_dlink_flaw_exploited_in_legacy_dsl_routers · Reddit Post
- https://twitter.com/PurpleOps_io/status/2008841144344436975 · Twitter Post
- https://t.me/pentestingnews/72144 · Telegram Post
- https://twitter.com/0dayPublishing/status/2008288876251455716 · Twitter Post
- https://twitter.com/gothburz/status/2009219370883412271 · Twitter Post