Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
UtiliaCS 970x120
Critical RCE Vulnerability in D-Link DSL Routers – Update Now

Critical RCE Vulnerability in D-Link DSL Routers – Update Now

7 January 2026 10:47

A critical remote code execution (RCE) flaw in older D-Link DSL routers has been identified as CVE-2026-0625, with a CVSS v4.0 score of 9.3, indicating a high risk for users who continue to use this hardware. Security researchers have found this vulnerability to be actively exploited, leaving thousands of unprotected devices vulnerable to complete compromise. These legacy devices are extremely vulnerable.

“An unauthenticated remote attacker can inject and execute arbitrary shell commands, resulting in remote code execution,” the issued security advisory warns .

The flaw resides in the router’s DNS configuration interface, specifically the dnscfg.cgi endpoint. According to VulnCheck’s January 5 advisory, the issue stems from improper input sanitization. Attackers can exploit this oversight to inject arbitrary shell commands directly through the router’s web interface, without ever having to log in.

The vulnerability affects a specific range of home and small office DSL gateway routers:

  • DSL-526B (Firmware ≤ 2.01)
  • DSL-2640B (Firmware ≤ 1.07)
  • DSL-2740R (Firmware
  • DSL-2780B (Firmware ≤ 1.01.14)

This particular component is no stranger to being targeted. The endpoint’s historical ties to known DNSChanger attacks, which occurred between 2016 and 2019, suggest that threat actors are repurposing old tactics to attack aging infrastructure.

The Shadowserver Foundation first detected evidence of active exploitation on November 27, 2025 , months before the wider security community was alerted.

This zero-day” window allowed attackers to create a botnet of compromised devices or silently manipulate DNS settings to redirect user traffic to malicious sites.

D-Link has declared these models End of Life (EOL) in early 2020. As a result, there are no security patches available or planned. The only solution is to replace the hardware with a modern, supported device . Continuing to use these legacy gateways is like leaving the digital front door wide open.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.