Critical Zero-Day in D-Link DSL Gateways Under Active Exploitation
A severe command injection vulnerability in end-of-life D-Link DSL gateway devices is being actively exploited by threat actors, with no patch forthcoming from the manufacturer.
The Vulnerability
Tracked as CVE-2026-0625 with a critical CVSS score of 9.3, the flaw exists in the dnscfg.cgi component responsible for handling DNS configuration. Due to insufficient input sanitization, remote attackers can inject malicious shell commands without authentication—achieving full remote code execution on vulnerable devices.
Active Exploitation Confirmed
Vulnerability intelligence firm VulnCheck has linked the vulnerable endpoint to previous DNSChanger campaigns that targeted D-Link gateways between 2016 and 2019. Affected models from those earlier attacks included:
- DSL-2740R
- DSL-2640B
- DSL-2780B
- DSL-526B
Telemetry from The Shadowserver Foundation indicates that exploitation of CVE-2026-0625 began in late November 2025, confirming this is being weaponized as a zero-day in the wild.
D-Link's Response: No Patch Coming
D-Link has acknowledged the vulnerability but confirmed that all affected devices are legacy products that reached end-of-life or end-of-support over five years ago. The company will not release a security patch.
"D-Link continues a detailed firmware-level review to determine affected devices," the company stated. "An updated list of specific models will be published later this week."
The vendor's official recommendation: retire and replace affected gateways with currently supported hardware.
Potential Impact
Compromised D-Link gateways could be leveraged for:
- DDoS botnets – Adding firepower to distributed attacks
- Proxy infrastructure – Routing malicious traffic through residential IPs
- Traffic interception – Redirecting DNS queries to attacker-controlled servers
- Network pivoting – Using the gateway as a foothold to move laterally within internal networks
Recommendations
Organizations and home users with older D-Link DSL gateways should:
- Check if your device is affected – Monitor D-Link's advisory for the updated model list
- Replace legacy hardware immediately – No patch will be issued
- Monitor for signs of compromise – Unusual DNS behavior, unexpected outbound connections
- Segment IoT/network devices – Limit exposure if replacement isn't immediately possible