New D-Link flaw in legacy DSL routers actively exploited in attacks
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章内容,找出关键信息。 文章主要讲的是D-Link的一些DSL网关路由器存在一个命令注入漏洞,编号是CVE-2026-0625。这个漏洞影响了dnscfg.cgi这个端点,因为CGI库的输入没有正确清理。攻击者可以利用这个漏洞通过DNS配置参数执行远程命令。 VulnCheck公司在12月15日向D-Link报告了这个问题,并且提到Shadowserver基金会观察到了一次攻击尝试。受影响的设备型号包括DSL-526B、DSL-2640B等,这些设备已经停产,不再提供固件更新。因此,D-Link建议用户替换这些设备。 此外,文章还提到D-Link正在调查是否有其他产品受到影响,并指出当前分析显示很难准确检测所有受影响的型号。用户应该考虑更换设备或在非关键网络中使用,并应用最新的固件和严格的安全设置。 总结一下,我需要把这些关键点浓缩到100字以内:漏洞名称、影响范围、攻击方式、受影响设备、厂商建议以及安全措施。 </think> D-Link多款已停产的DSL网关路由器因CVE-2026-0625漏洞存在命令注入风险,攻击者可通过DNS配置参数执行远程命令。VulnCheck于12月报告该问题,受影响设备已无固件更新支持,建议用户更换设备或采取安全措施。 2026-1-6 20:1:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

New D-Link flaw in legacy DSL routers actively exploited in attacks

Threat actors are exploiting a recently discovered command injection vulnerability that affects multiple D-Link DSL gateway routers that went out of support years ago.

The vulnerability is now tracked as CVE-2026-0625 and affects the dnscfg.cgi endpoint due to improper input sanitization in a CGI library. An unauthenticated attacker could leverage this to execute remote commands via DNS configuration parameters.

Vulnerability intelligence company VulnCheck reported the problem to D-Link on December 15, after The Shadowserver Foundation observed a command injection exploitation attempt on one of its honeypots.

Wiz

VulnCheck told BleepingComputer that the technique captured by Shadowserver does not appear to have been publicly documented.

"An unauthenticated remote attacker can inject and execute arbitrary shell commands, resulting in remote code execution," VulnCheck says in the security advisory.

In collaboration with VulnCheck, D-Link confirmed the following device models and firmware versions to be affected by CVE-2026-0625:

  • DSL-526B ≤ 2.01
  • DSL-2640B ≤ 1.07
  • DSL-2740R < 1.17
  • DSL-2780B ≤ 1.01.14

The above have reached end-of-life (EoL) since 2020 and will not receive firmware updates to address CVE-2026-0625. Hence, the vendor strongly recommends retiring and replacing the affected devices with supported models.

D-Link is still trying to determine if any other products are impacted by analyzing various firmware releases.

"Both D-Link and VulnCheck face complexity in precisely identifying all impacted models due to variations in firmware implementations and product generations," D-Link explains.

"Current analysis shows no reliable model number detection method beyond direct firmware inspection. For this reason, D-Link is validating firmware builds across legacy and supported platforms as part of the investigation," says the vendor.

Currently, it is unclear who is exploiting the vulnerability and against what targets. However, VulnCheck says that most consumer router setups allow only LAN access to administrative Common Gateway Interface (CGI) endpoints such as dnscfg.cgi.

Exploiting CVE-2026-0625 would imply a browser-based attack or a target device configured for remote administration.

Users of end-of-life (EoL) routers and networking devices should replace them with models that are actively supported by the vendor or deploy them in non-critical networks, preferably segmented, using the latest available firmware version and restrictive security settings.

D-Link is warning users that the EoL devices do not receive firmware updates, security patches, or any maintenance.

Wiz

7 Security Best Practices for MCP

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.


文章来源: https://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/
如有侵权请联系:admin#unsafe.sh