Executive Summary
In early January 2026, a critical security incident involving D-Link legacy DSL routers came to light as attackers actively exploited a command injection vulnerability tracked as CVE-2026-0625. The flaw, caused by improper input sanitization in the dnscfg.cgi endpoint of several out-of-support D-Link DSL gateway models, allowed unauthenticated remote attackers to execute arbitrary shell commands and potentially gain full control over affected devices. Although the exploit was first detected by Shadowserver Foundation honeypots, the method was not previously public, raising the risk of widespread attacks on consumer and small business network infrastructure. Impacted routers—including the DSL-526B, DSL-2640B, DSL-2740R, and DSL-2780B—are end-of-life and will not receive security updates, leaving users exposed unless devices are decommissioned or isolated.
This incident highlights the persistent risks associated with legacy, unsupported network hardware across both consumer and SMB environments, particularly as attackers increasingly exploit unpatched, remotely accessible routers. It underscores the urgent importance of retiring end-of-life devices or segmenting critical networks, as well as the need for improved asset management strategies in the face of rising supply-chain and infrastructure vulnerabilities.
Why This Matters Now
Active exploitation of unpatched, end-of-life D-Link DSL routers demonstrates how outdated infrastructure remains a major security liability. With vendors unable to provide fixes and attackers leveraging recently discovered methods, any organizations or individuals using these routers face immediate risk of network compromise. The urgency stems from the opportunity for remote code execution, enabling attackers to infiltrate internal networks, pivot laterally, or stage further attacks undetected.
Attack Path Analysis
The attack began with an unauthenticated remote exploitation of a command injection vulnerability (CVE-2026-0625) in legacy D-Link DSL routers via a poorly sanitized CGI endpoint. Upon gaining a foothold, attackers remotely executed shell commands to establish persistent control, potentially escalating privileges on the device. With access, attackers could move laterally to other internal resources reachable from the compromised router. The threat actors established command and control channels to receive instructions and deliver payloads. Exfiltration of sensitive traffic or credentials was possible via outbound connections. Ultimately, the compromise exposed network infrastructure, with potential for further disruption or staging attacks, especially since these EoL devices could not be patched.
Kill Chain Progression
Initial Compromise
Description
Attackers exploited the unauthenticated command injection flaw in the D-Link CGI endpoint to execute remote code on the router.
Related CVEs
CVE-2026-0625
CVSS 9.3Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint, allowing unauthenticated attackers to modify DNS settings and execute arbitrary shell commands, leading to remote code execution.
Affected Products:
D-Link DSL-526B – ≤ 2.01
D-Link DSL-2640B – ≤ 1.07
D-Link DSL-2740R – < 1.17
D-Link DSL-2780B – ≤ 1.01.14
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Initial set of MITRE ATT&CK techniques mapped for SEO/filtering; expand with STIX/TAXII for full enrichment in future iterations.
Exploit Public-Facing Application
Exploitation of Remote Services
Exploitation for Client Execution
Command and Scripting Interpreter: Unix Shell
Exploitation for Privilege Escalation
File and Directory Permissions Modification
Obtain Capabilities: Vulnerabilities
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Security of System Components Not Supported by Vendor
Control ID: 6.2.4
NYDFS 23 NYCRR 500 – Application Security
Control ID: 500.08
DORA (EU Digital Operational Resilience Act) – ICT Asset Management
Control ID: Art. 9(2)
CISA Zero Trust Maturity Model 2.0 – Inventory & Disposition of Devices
Control ID: Device Pillar - Lifecycle Management
NIS2 Directive – Technical and Organizational Measures
Control ID: Article 21(2) (b, d, f)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Telecommunications
Critical infrastructure vulnerability in legacy DSL routers enables remote code execution, compromising network infrastructure and customer data transmission security.
Internet
End-of-life D-Link router exploitation allows command injection attacks, threatening ISP networks and internet service delivery through compromised gateway devices.
Information Technology/IT
CVE-2026-0625 enables unauthenticated remote attacks on legacy networking equipment, requiring immediate device replacement and network segmentation for IT infrastructure protection.
Financial Services
Router command injection vulnerabilities expose financial networks to lateral movement attacks, violating compliance requirements and enabling potential data exfiltration scenarios.
Sources
- New D-Link flaw in legacy DSL routers actively exploited in attackshttps://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/Verified
- D-Link Legacy (EOL/EOS) DSL Gateways/Routers: CVE-2026-0625: Command Injection via DNS feature exploithttps://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10488Verified
- D-Link DSL/DIR/DNS Command Injection via DNS Configuration Endpointhttps://www.vulncheck.com/advisories/dlink-dsl-command-injection-via-dns-configuration-endpointVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Applying Zero Trust controls such as network segmentation, strict policy enforcement, egress filtering, and real-time threat detection would have significantly hardened legacy router deployments, reducing the risk and progression of exploitation even in cases where patching is not possible. CNSF capabilities offer inline enforcement to block initial exploit attempts, minimize lateral movement, and disrupt command and control or data exfiltration.
Control: Cloud Firewall (ACF)
Mitigation: Blocked inbound attack traffic targeting exposed device management interfaces.
Control: Inline IPS (Suricata)
Mitigation: Detected and prevented exploitation attempts using known malicious signatures.
Control: Zero Trust Segmentation
Mitigation: Prevented unauthorized east-west movement from compromised network segments.
Control: Egress Security & Policy Enforcement
Mitigation: Blocked unauthorized outbound command-and-control communications.
Control: Encrypted Traffic (HPE) & Multicloud Visibility & Control
Mitigation: Monitored and restricted unencrypted exfiltration attempts and increased visibility to anomalous outbound traffic.
Early detection enabled rapid containment and reduced blast radius.
Impact at a Glance
Affected Business Functions
- Network Operations
- Internet Connectivity
Estimated downtime: 3 days
Estimated loss: $50,000
Potential exposure of sensitive user data due to DNS hijacking, leading to unauthorized access and data interception.
Recommended Actions
Key Takeaways & Next Steps
- • Immediately decommission unsupported or EoL network devices and replace with vendor-supported hardware.
- • Enforce network segmentation and Zero Trust policies to isolate legacy or potentially vulnerable devices.
- • Deploy cloud-native firewalls and inline IPS to inspect, detect, and block both inbound exploits and outbound C2/exfiltration attempts.
- • Apply strict egress controls to monitor and restrict data leaving the environment, especially from non-standard or legacy devices.
- • Enhance threat detection with centralized visibility, anomaly detection, and rapid response workflows for all network infrastructure.



