A specific Remote Code Execution (RCE) vulnerability in legacy D-Link DSL routers allows an unauthenticated remote attacker to inject and execute arbitrary commands on the target device. Because the vulnerability resides in the router's firmware, successful manipulation grants the attacker root-level access.
This level of control enables threat actors to modify device settings, intercept network traffic, or install malware, effectively turning the router into a node in a distributed denial-of-service (DDoS) botnet.
Shadowserver Foundation observed evidence of attackers exploiting this flaw on November 27, 2025, affecting devices declared EOL in 2020. This command injection vulnerability in the dnscfg.cgi endpoint stems from improper sanitization of user-supplied DNS configuration parameters.
The affected endpoint is also associated with unauthenticated DNS modification (“DNSChanger”) behavior that D-Link documented, which reported active exploitation campaigns from 2016 through 2019 that targeted firmware variants of the DSL-2740R, DSL-2640B, DSL-2780B, and DSL-526B models.
It is now affecting:
The targeted devices have reached End-of-Life (EOL), posing a significant challenge to the security of legacy routers. When a product reaches EOL, the manufacturer ceases technical support and software development, leaving users permanently exposed to exploitation.
This vulnerability, tracked as CVE-2026-0625, will most probably not be patched. The primary recommendation for organizations and individuals using these legacy D-Link DSL routers is to replace the hardware immediately and migrate to actively supported devices that receive regular firmware updates.
In November, a new Mirai variant, ShadowV2, targeted vulnerable IoT devices to create a botnet for DDoS attacks. Two months earlier, a critical TP-Link zero-day exposed millions of routers to full system takeover.