Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit Zero-Day in Discontinued D-Link Devices

Posted on January 7, 2026January 7, 2026 By CWS

An OS command injection vulnerability in discontinued D-Hyperlink gateway gadgets has been exploited within the wild as a zero-day.

Tracked as CVE-2026-0625 (CVSS rating of 9.3), the safety defect exists as a result of the dnscfg.cgi library doesn’t correctly sanitize user-supplied DNS configuration parameters.

The problem permits distant, unauthenticated attackers to inject and execute arbitrary shell instructions, reaching distant code execution (RCE), vulnerability intelligence firm VulnCheck explains.

“The affected endpoint can be related to unauthenticated DNS modification (DNSChanger) conduct documented by D-Hyperlink, which reported lively exploitation campaigns focusing on firmware variants of the DSL-2740R, DSL-2640B, DSL-2780B, and DSL-526B fashions from 2016 via 2019,” VulnCheck says.

Based mostly on information from The Shadowserver Basis, CVE-2026-0625 has been exploited within the wild since late November 2025, the vulnerability intelligence agency notes.

In line with D-Hyperlink, the exploited zero-day impacts a number of gadget fashions. Nevertheless, variations in firmware implementations make it tough to compile a listing of weak home equipment.Commercial. Scroll to proceed studying.

“D-Hyperlink continues an in depth firmware-level assessment to find out affected gadgets. An up to date listing of particular fashions and, the place relevant, firmware variations underneath assessment will likely be printed later this week,” the seller notes in an advisory.

The confirmed weak fashions, D-Hyperlink says, are legacy DSL gateway home equipment that have been discontinued half a decade in the past.

“All confirmed findings to this point level to legacy DSL gateway merchandise that reached Finish of Life or Finish of Help greater than 5 years in the past. These merchandise now not obtain firmware updates, safety patches, or lively engineering upkeep,” the corporate explains.

No patch will likely be launched for the zero-day and the homeowners of the weak D-Hyperlink merchandise ought to retire them and change them with supported fashions, the corporate says.

There doesn’t look like any data on the assaults exploiting CVE-2026-0625, however compromised D-Hyperlink networking gadgets may be abused by menace actors for numerous functions, together with DDoS assaults, proxy companies, site visitors interception and redirection, and lateral motion. 

Associated: D-Hyperlink Warns of RCE Vulnerability in Legacy Routers

Associated: Organizations Warned of Vulnerability Exploited In opposition to Discontinued TP-Hyperlink Routers

Associated: Vital Situation: Legacy Medical Gadgets Stay Straightforward Targets for Ransomware

Associated: Unpatched Flaw in Legacy D-Hyperlink NAS Gadgets Exploited Days After Disclosure

Security Week News Tags:Devices, Discontinued, DLink, Exploit, Hackers, ZeroDay

Post navigation

Previous Post: Threat Actors Leversges Google Cloud Services to Steal Microsoft 365 Logins
Next Post: Cybersecurity Firms Secured $14 Billion in Funding in 2025: Analysis

Related Posts

High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter  Security Week News
In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests Security Week News
Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack Security Week News
Fraud: A Growth Industry Powered by Gen-AI Security Week News
NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms Security Week News
Two Exploited Vulnerabilities Patched in Android Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark