Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Pricing Choices and Useful Scope

    January 25, 2026

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    Conversational AI doesn’t perceive customers — 'Intent First' structure does

    January 25, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Ongoing Assaults Exploiting Essential RCE Vulnerability in Legacy D-Hyperlink DSL Routers
    AI Ethics & Regulation

    Ongoing Assaults Exploiting Essential RCE Vulnerability in Legacy D-Hyperlink DSL Routers

    Declan MurphyBy Declan MurphyJanuary 7, 2026No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Ongoing Assaults Exploiting Essential RCE Vulnerability in Legacy D-Hyperlink DSL Routers
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Jan 07, 2026Ravie LakshmananCommunity Safety / Vulnerability

    A newly found important safety flaw in legacy D-Hyperlink DSL gateway routers has come below energetic exploitation within the wild.

    The vulnerability, tracked as CVE-2026-0625 (CVSS rating: 9.3), considerations a case of command injection within the “dnscfg.cgi” endpoint that arises because of improper sanitization of user-supplied DNS configuration parameters.

    “An unauthenticated distant attacker can inject and execute arbitrary shell instructions, leading to distant code execution,” VulnCheck famous in an advisory.

    “The affected endpoint can also be related to unauthenticated DNS modification (‘DNSChanger’) conduct documented by D-Hyperlink, which reported energetic exploitation campaigns concentrating on firmware variants of the DSL-2740R, DSL-2640B, DSL-2780B, and DSL-526B fashions from 2016 by 2019.”

    Cybersecurity

    The cybersecurity firm additionally famous that exploitation makes an attempt concentrating on CVE-2026-0625 had been recorded by the Shadowserver Basis on November 27, 2025. Among the impacted gadgets have reached end-of-life (EoL) standing as of early 2020 –

    • DSL-2640B <= 1.07
    • DSL-2740R < 1.17
    • DSL-2780B <= 1.01.14
    • DSL-526B <= 2.01

    In an alert of its personal, D-Hyperlink initiated an inside investigation following a report from VulnCheck on December 16, 2025, about energetic exploitation of “dnscfg.cgi,” and that it is working to determine historic and present use of the CGI library throughout all its product choices.

    It additionally cited complexities in precisely figuring out affected fashions because of variations in firmware implementations and product generations. An up to date record of particular fashions is predicted to be printed later this week as soon as a firmware-level overview is full.

    “Present evaluation reveals no dependable mannequin quantity detection technique past direct firmware inspection,” D-Hyperlink mentioned. “For that reason, D-Hyperlink is validating firmware builds throughout legacy and supported platforms as a part of the investigation.”

    At this stage, the identification of the risk actors exploiting the flaw and the dimensions of such efforts usually are not recognized. On condition that the vulnerability impacts DSL gateway merchandise which have been phased out, it is necessary for machine homeowners to retire them and improve to actively supported gadgets that obtain common firmware and safety updates.

    Cybersecurity

    “CVE-2026-0625 exposes the identical DNS configuration mechanism leveraged in previous large-scale DNS hijacking campaigns,” Area Impact mentioned. “The vulnerability permits unauthenticated distant code execution by way of the dnscfg.cgi endpoint, giving attackers direct management over DNS settings with out credentials or person interplay.”

    “As soon as altered, DNS entries can silently redirect, intercept, or block downstream visitors, leading to a persistent compromise affecting each machine behind the router. As a result of the impacted D-Hyperlink DSL fashions are finish of life and unpatchable, organizations that proceed to function them face elevated operational threat.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    FBI Accessed Home windows Laptops After Microsoft Shared BitLocker Restoration Keys – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    January 25, 2026

    Multi-Stage Phishing Marketing campaign Targets Russia with Amnesia RAT and Ransomware

    January 25, 2026
    Top Posts

    Pricing Choices and Useful Scope

    January 25, 2026

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Pricing Choices and Useful Scope

    By Amelia Harper JonesJanuary 25, 2026

    SweetAI is offered as a chatbot designed for customers in search of interplay that doesn’t…

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    Conversational AI doesn’t perceive customers — 'Intent First' structure does

    January 25, 2026

    FBI Accessed Home windows Laptops After Microsoft Shared BitLocker Restoration Keys – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    January 25, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.