[CIVN-2026-0003] Command Injection Vulnerability in D-Link DSL Routers

By Published On: January 9, 2026

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Command Injection Vulnerability in D-Link DSL Routers 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Systems Affected
DSL-2740R Versions earlier than 1.17
DSL-2640B Versions 1.07 and below
DSL-2780B Versions 1.01.14 and below
DSL-526B Versions 2.01 and below
Overview
A critical vulnerability has been reported in multiple legacy D-Link DSL gateway routers, which may allow a remote attacker to execute arbitrary shell commands on the targeted device.
Target Audience:
Home Users & Small Business Owners, Network Administrators & SOC Analysts, Managed Service Providers (MSPs) & ISPs, Cybersecurity Researchers & Threat Hunters
Risk Assessment:
Critical risks on confidentiality, integrity, and availability of the systems.
Impact Assessment:
Compromise of integrity and confidentiality.
Description
D-Link DSL gateway routers are network devices that combine a DSL modem and a router in one unit. They are commonly used to provide internet access over DSL (Digital Subscriber Line) connections while also managing local networks, offering features like Wi-Fi connectivity, NAT, firewall protection, and DNS configuration.
A Vulnerability exists in the dnscfg.cgi endpoint of the routers web interface due to improper sanitization of user-supplied DNS configuration parameters.
Successfully exploitation of this vulnerability could allow an unauthenticated remote attacker inject and execute arbitrary shell commands on the affected device.
Note: This vulnerability is being exploited in the wild. Users are advised to apply patches urgently.
Solution
Apply appropriate software updates as mentioned by Security vendor
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10068
Vendor Information
D-link
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10068
References
 
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10068
CVE Name
CVE-2026-0625
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=nnOz
—–END PGP SIGNATURE—–

Share this article