Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Zero-Day in Discontinued D-Link Devices

Hackers Exploit Zero-Day in Discontinued D-Link Devices

Posted on January 7, 2026January 7, 2026 By CWS

An OS command injection vulnerability in discontinued D-Hyperlink gateway gadgets has been exploited within the wild as a zero-day.

Tracked as CVE-2026-0625 (CVSS rating of 9.3), the safety defect exists as a result of the dnscfg.cgi library doesn’t correctly sanitize user-supplied DNS configuration parameters.

The problem permits distant, unauthenticated attackers to inject and execute arbitrary shell instructions, reaching distant code execution (RCE), vulnerability intelligence firm VulnCheck explains.

“The affected endpoint can be related to unauthenticated DNS modification (DNSChanger) conduct documented by D-Hyperlink, which reported lively exploitation campaigns focusing on firmware variants of the DSL-2740R, DSL-2640B, DSL-2780B, and DSL-526B fashions from 2016 via 2019,” VulnCheck says.

Based mostly on information from The Shadowserver Basis, CVE-2026-0625 has been exploited within the wild since late November 2025, the vulnerability intelligence agency notes.

In line with D-Hyperlink, the exploited zero-day impacts a number of gadget fashions. Nevertheless, variations in firmware implementations make it tough to compile a listing of weak home equipment.Commercial. Scroll to proceed studying.

“D-Hyperlink continues an in depth firmware-level assessment to find out affected gadgets. An up to date listing of particular fashions and, the place relevant, firmware variations underneath assessment will likely be printed later this week,” the seller notes in an advisory.

The confirmed weak fashions, D-Hyperlink says, are legacy DSL gateway home equipment that have been discontinued half a decade in the past.

“All confirmed findings to this point level to legacy DSL gateway merchandise that reached Finish of Life or Finish of Help greater than 5 years in the past. These merchandise now not obtain firmware updates, safety patches, or lively engineering upkeep,” the corporate explains.

No patch will likely be launched for the zero-day and the homeowners of the weak D-Hyperlink merchandise ought to retire them and change them with supported fashions, the corporate says.

There doesn’t look like any data on the assaults exploiting CVE-2026-0625, however compromised D-Hyperlink networking gadgets may be abused by menace actors for numerous functions, together with DDoS assaults, proxy companies, site visitors interception and redirection, and lateral motion. 

Associated: D-Hyperlink Warns of RCE Vulnerability in Legacy Routers

Associated: Organizations Warned of Vulnerability Exploited In opposition to Discontinued TP-Hyperlink Routers

Associated: Vital Situation: Legacy Medical Gadgets Stay Straightforward Targets for Ransomware

Associated: Unpatched Flaw in Legacy D-Hyperlink NAS Gadgets Exploited Days After Disclosure

Security Week News Tags:Devices, Discontinued, DLink, Exploit, Hackers, ZeroDay

Post navigation

Previous Post: Threat Actors Leversges Google Cloud Services to Steal Microsoft 365 Logins
Next Post: Cybersecurity Firms Secured $14 Billion in Funding in 2025: Analysis

Related Posts

Personal Information Compromised in Freedom Mobile Data Breach Personal Information Compromised in Freedom Mobile Data Breach Security Week News
Major Firms Release New ICS Security Advisories Major Firms Release New ICS Security Advisories Security Week News
AirSnitch Exposes Vulnerabilities in Wi-Fi Client Isolation AirSnitch Exposes Vulnerabilities in Wi-Fi Client Isolation Security Week News
Tea App Takes Messaging System Offline After Second Security Issue Reported Tea App Takes Messaging System Offline After Second Security Issue Reported Security Week News
Intel Employee Data Exposed by Vulnerabilities Intel Employee Data Exposed by Vulnerabilities Security Week News
ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Aveva, Phoenix Contact ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Aveva, Phoenix Contact Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark