This critical severity flaw in D-Link DSL gateway devices could allow for remote code execution



  • CVE-2026-0625, a critical command injection flaw (9.3/10), is being actively exploited in legacy D-Link gateway routers
  • Vulnerable models include DSL-2740R, DSL-2640B, DSL-2780B, and DSL-526B, with attacks observed since November 2025
  • Researchers urge replacing unsupported devices, as compromised routers can enable RCE, credential theft, ransomware, and botnet activity

D-Link has confirmed that some of its gateway routers, which reached end-of-life (EoL) status years ago, are being exploited in the wild.

Earlier this week, security researchers from VulnCheck announced finding a command injection vulnerability due to improper sanitization of user-supplied DNS configuration parameters. The bug is tracked as CVE-2026-0625 and has a severity score of 9.3/10 (critical).


https://cdn.mos.cms.futurecdn.net/xiF2oa9QT4q5sePeRdA8Af-1920-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img