Blog

"Prevention is cheaper than a breach"

Home / Threats / CVE-2026-0625

CVE-2026-0625 - DIR-600 Plugin

CVE-2026-0625

Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality. By directly requesting this endpoint, an attacker can modify the device’s DNS settings without valid credentials, enabling DNS hijacking (“DNSChanger”) attacks that redirect user traffic to attacker-controlled infrastructure. In 2019, D-Link reported that this behavior was leveraged by the "GhostDNS" malware ecosystem targeting consumer and carrier routers. All impacted products were subsequently designated end-of-life/end-of-service, and no longer receive security updates. Exploitation evidence was observed by the Shadowserver Foundation on 2025-11-27 (UTC).

CVE-2026-0625

CRITICAL CVSS 9.3 Published 2026-01-05 Updated 2026-01-08
AI Risk Critical (92/100) Active Exploit: No strong signal Published Exploit: No public exploit references Priority: P1 Immediate
Severity Band CRITICAL
CVSS Vector CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Components 17
Reference Links 4
AI Risk Engine Critical (92/100)
Exploitability High
Active Exploitation No strong signal
Published Exploit Status No public exploit references

Threat Timeline

  1. 2026-01-05 CVE published and first recorded in the threat feed.
  2. 2026-01-08 Record updated with latest vulnerability metadata.
  3. 2026-04-09 AI technical context refreshed for mitigation and impact guidance.
  4. Now Monitoring for follow-up changes, linked references, and new related CVEs.

AI Context

Machine-generated threat intelligence

AI Updated 7 days ago

AI enriched 7 days ago (2026-04-09 07:15 UTC)

Technical Summary

Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality. By directly requesting this endpoint, an attacker can modify the device’s DNS settings without valid credentials, enabling DNS hijacking (“DNSChanger”) attacks that redirect user traffic to attacker-controlled infrastructure. In 2019, D-Link reported that this behavior was leveraged by the "GhostDNS" malware ecosystem targeting consumer and carrier routers. All impacted products were subsequently designated…

Potential Impact

Severity is CRITICAL (CVSS 9.3). Depending on deployment context, affected components may be exposed to unauthorized actions or data integrity risk.

Exploitability Assessment

Exploitability is assessed as High based on low-bar exploit prerequisites.

Primary risk drivers: low-bar exploit prerequisites

Mitigation Recommendations

Validate affected product versions, prioritize patching, and monitor references for vendor remediation guidance. If immediate patching is not possible, apply compensating controls and limit exposure of vulnerable surfaces.

Detection & Monitoring

Track authentication anomalies, unexpected file writes, and suspicious plugin API activity around affected components.

Business Impact Lens

Prioritize remediation where affected components process customer data, admin sessions, or Internet-exposed workflows.

Affected Products

DIR-600 PLUGIN · dir-600 Affected: >= 0, <= 0 Fixed version not specified
DIR-608 PLUGIN · dir-608 Affected: >= 0, <= 0 Fixed version not specified
DIR-610 PLUGIN · dir-610 Affected: >= 0, <= 0 Fixed version not specified
DIR-611 PLUGIN · dir-611 Affected: >= 0, <= 0 Fixed version not specified
DIR-615 PLUGIN · dir-615 Affected: >= 0, <= 0 Fixed version not specified
DIR-905L PLUGIN · dir-905l Affected: >= 0, <= 0 Fixed version not specified
DNS-320 PLUGIN · dns-320 Affected: >= 0, <= 0 Fixed version not specified
DNS-325 PLUGIN · dns-325 Affected: >= 0, <= 0 Fixed version not specified
DNS-345 PLUGIN · dns-345 Affected: >= 0, <= 0 Fixed version not specified
DSL-2640B PLUGIN · dsl-2640b Affected: >= 0, <= 0 Fixed version not specified
DSL-2640T PLUGIN · dsl-2640t Affected: >= 0, <= 0 Fixed version not specified
DSL-2740R PLUGIN · dsl-2740r Affected: >= 0, <= 0 Fixed version not specified
DSL-2780B PLUGIN · dsl-2780b Affected: >= 0, <= 0 Fixed version not specified
DSL-500 PLUGIN · dsl-500 Affected: >= 0, <= 0 Fixed version not specified
DSL-500G PLUGIN · dsl-500g Affected: >= 0, <= 0 Fixed version not specified
DSL-502G PLUGIN · dsl-502g Affected: >= 0, <= 0 Fixed version not specified
DSL-526B PLUGIN · dsl-526b Affected: >= 0, <= 0 Fixed version not specified
Scroll to top