Attackers are actively exploiting a critical command injection vulnerability in legacy D-Link routers that allows unauthenticated remote code execution. CVE-2026-0625 carries a CVSS score of 9.3, and because the affected devices reached end-of-life before 2020, no patch will be released.

Vulnerability overview

AttributeValue
CVECVE-2026-0625
CVSS Score9.3 (Critical)
TypeCommand injection
AuthenticationNone required
User interactionNone required
Patch statusNone available (EOL)

Technical details

The flaw exists in the dnscfg.cgi endpoint, which handles DNS configuration on affected routers.

Root cause

The dns_server parameter is not sanitized before being passed to a shell command, allowing attackers to inject arbitrary commands using standard shell metacharacters:

  • ; (command separator)
  • | (pipe)
  • $() (command substitution)

Exploitation

“An unauthenticated remote attacker can inject and execute arbitrary shell commands, resulting in remote code execution.” — VulnCheck advisory

Attack requirements:

  • Network access to management interface
  • No authentication needed
  • No user interaction required

Affected devices

DSL series (ADSL routers)

ModelStatus
DSL-500EOL, vulnerable
DSL-500GEOL, vulnerable
DSL-502GEOL, vulnerable
DSL-526BEOL, vulnerable
DSL-2640BEOL, vulnerable
DSL-2640TEOL, vulnerable
DSL-2740REOL, vulnerable
DSL-2780BEOL, vulnerable

DIR series (consumer routers)

ModelStatus
DIR-600EOL, vulnerable
DIR-608EOL, vulnerable
DIR-610EOL, vulnerable
DIR-611EOL, vulnerable
DIR-615EOL, vulnerable
DIR-905LEOL, vulnerable

DNS series (network storage)

ModelStatus
DNS-320EOL, vulnerable
DNS-325EOL, vulnerable
DNS-345EOL, vulnerable

Note: D-Link states that confirming vulnerability requires direct firmware inspection—model number alone is not sufficient.

Exploitation timeline

DateEvent
November 27, 2025Shadowserver Foundation records first exploitation
December 16, 2025VulnCheck notifies D-Link of active exploitation
December 2025D-Link publishes advisory SAP10488
January 5, 2026VulnCheck publishes detailed advisory
OngoingActive exploitation continues

Exploitation was observed months before public disclosure, indicating attackers discovered the vulnerability independently.

VulnCheck disclosure process

DateAction
November 27, 2025Shadowserver observes first exploitation
December 16, 2025VulnCheck notifies D-Link
December 2025D-Link issues SAP10488 advisory
January 5, 2026VulnCheck publishes detailed advisory

VulnCheck reported observing “active exploitation of a compromised CGI library in certain D-Link devices” in production environments before contacting D-Link.

Targeted firmware variants

Exploitation campaigns have specifically targeted:

  • DSL-2740R
  • DSL-2640B
  • DSL-2780B
  • DSL-526B

Attack capabilities

Successful exploitation gives attackers full control over the device:

CapabilityImpact
DNS manipulationRedirect all traffic through attacker infrastructure
Phishing enablementRedirect banking, email sites to fake pages
Credential theftIntercept login credentials
Ad injectionInsert malicious advertisements
Botnet recruitmentJoin device to DDoS or proxy botnet
Network pivotUse router as entry point to internal network
Traffic interceptionMonitor unencrypted communications

Downstream impact

Once DNS settings are altered, every device behind the router—phones, laptops, IoT devices—can be silently redirected without any indication to users.

Historical context

CVE-2026-0625 exposes the same DNS configuration mechanism abused in previous large-scale campaigns:

GhostDNS campaign (2018-2019)

MetricImpact
Devices compromised100,000+
Primary targetsBrazilian banking customers
TechniqueDNS hijacking to fake bank sites

DNSChanger campaigns (2016-2019)

MetricImpact
Devices compromisedHundreds of thousands
Primary targetsConsumer routers globally
TechniqueMalicious ad injection, credential theft

D-Link documented these attacks affecting the same endpoint between 2016 and 2019.

PyPhp variant details

The GhostDNS ecosystem included a sophisticated attack infrastructure:

ComponentDetails
PyPhp modulePrimary attack module
C2 servers100+ command-and-control servers
HostingLargely cloud-hosted infrastructure
Attack scripts100+ scripts targeting routers
Target scopePublic internet and internal networks

The attack scripts were designed to target routers both on the public internet and behind NAT on internal networks.

Remediation

Primary recommendation: Replace the hardware

“D-Link Systems, Inc. recommends retiring affected legacy devices and replacing them with supported products that receive regular firmware updates.”

All affected devices reached end-of-life before 2020 and will never receive patches.

If immediate replacement isn’t possible

MitigationImplementation
Disable remote managementEliminate internet-facing attack surface
Block external web accessFirewall ports 80/443 to router
Network segmentationIsolate router from sensitive systems
Monitor DNS trafficAlert on unexpected configuration changes

Detection indicators

IndicatorDetection method
Unexpected DNS server changesRouter configuration review
Traffic to malicious infrastructureNetwork monitoring
Unusual outbound connectionsTraffic analysis
DNS queries resolving incorrectlyDNS response validation

The broader problem

This vulnerability highlights the endemic issue of end-of-life consumer networking equipment:

ChallengeScale
Installed baseMillions of vulnerable devices worldwide
User awarenessMost users don’t know devices are EOL
Update capabilityNo patches available
Replacement incentiveDevices still “work” for basic connectivity
VisibilityISPs and users often unaware of router model

Why it matters

FactorRisk
Always-on devicesContinuous attack surface
Network positionGateway to all connected devices
Trust positionDNS responses trusted by all clients
PersistenceSurvives endpoint security measures

Recommendations

For home users

PriorityAction
ImmediateCheck if your router is on the affected list
If affectedReplace with a currently supported device
If replacement delayedDisable remote management immediately
OngoingEnable automatic updates on new device

For small businesses

PriorityAction
ImmediateInventory all network equipment
HighReplace any EOL devices
HighImplement network monitoring
OngoingEstablish equipment lifecycle management

For ISPs

PriorityAction
HighIdentify affected customer equipment
HighNotify customers of vulnerability
ConsiderEquipment replacement programs
OngoingBlock exploitation traffic at network edge

Context

CVE-2026-0625 represents the long tail of IoT security debt. These routers were sold for years, deployed in millions of homes and small businesses, and then abandoned when D-Link ended support. The devices continue operating—and remain vulnerable—until they physically fail or are manually replaced.

The affected endpoint has been known to be dangerous since at least 2016. The vulnerability will continue to be exploited until the last affected device is retired.

The only real solution is hardware replacement. Mitigations can reduce risk, but cannot eliminate it. Organizations and individuals still running these devices face “elevated operational risk” that increases daily as exploitation techniques spread.

Firmware verification note

D-Link states that confirming vulnerability requires direct firmware inspection—model number alone is not sufficient to determine vulnerability status. The same model may have multiple firmware versions with varying vulnerability status.

Verification methodDetails
Model numberInsufficient alone
Firmware versionMust be inspected
Hardware revisionMay affect vulnerability
ConfigurationRemote management status

Organizations with D-Link equipment should verify firmware versions against D-Link’s SAP10488 advisory for specific vulnerable firmware builds.