Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0625: CWE-306 Missing Authentication for Critical Function in D-Link DSL-2640B

0
Critical
VulnerabilityCVE-2026-0625cvecve-2026-0625cwe-306
Published: Mon Jan 05 2026 (01/05/2026, 21:14:48 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DSL-2640B

Description

Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality. By directly requesting this endpoint, an attacker can modify the device’s DNS settings without valid credentials, enabling DNS hijacking (“DNSChanger”) attacks that redirect user traffic to attacker-controlled infrastructure. In 2019, D-Link reported that this behavior was leveraged by the "GhostDNS" malware ecosystem targeting consumer and carrier routers. All impacted products were subsequently designated end-of-life/end-of-service, and no longer receive security updates. Exploitation evidence was observed by the Shadowserver Foundation on 2025-11-27 (UTC).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:14:42 UTC

Technical Analysis

CVE-2026-0625 is a critical security vulnerability categorized under CWE-306 (Missing Authentication for Critical Function) found in multiple D-Link router models, notably the DSL-2640B. The vulnerability exists in the dnscfg.cgi endpoint of the device's web interface, which improperly enforces authentication and access controls. This flaw allows an unauthenticated remote attacker to directly access and modify the device’s DNS configuration settings. By exploiting this, attackers can perform DNS hijacking attacks, redirecting user traffic to attacker-controlled domains and infrastructure, facilitating phishing, malware distribution, or man-in-the-middle attacks. The vulnerability was actively exploited by the GhostDNS malware ecosystem in 2019, targeting consumer and carrier-grade routers. Despite the affected devices being designated end-of-life with no security patches available, exploitation evidence was observed as recently as November 2025 by the Shadowserver Foundation. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A) reflects a network-exploitable, no authentication required, no user interaction vulnerability with high impact on confidentiality, integrity, and availability. The lack of vendor patches and ongoing exploitation highlight the persistent risk posed by legacy D-Link devices still in operation worldwide.

Potential Impact

The impact of CVE-2026-0625 is severe for organizations and individuals using affected D-Link routers. Successful exploitation allows attackers to hijack DNS settings, redirecting all user traffic through malicious servers. This can lead to widespread phishing attacks, credential theft, malware infections, and interception of sensitive communications. For ISPs and carriers deploying these devices at scale, the vulnerability could enable large-scale traffic manipulation and espionage. The absence of authentication and ease of exploitation mean attackers can compromise devices remotely without user interaction, increasing the attack surface. Since the affected devices are end-of-life and unpatched, organizations cannot remediate via firmware updates, raising the risk of persistent compromise. This undermines network trust, data confidentiality, and availability of internet services, potentially causing reputational damage and financial losses.

Mitigation Recommendations

Given the lack of available patches for affected D-Link devices, the primary mitigation is to replace all impacted routers with supported, updated hardware that enforces proper authentication controls. Network administrators should immediately audit their infrastructure to identify any legacy D-Link DSL/DIR/DNS devices, especially DSL-2640B models. Until replacement, organizations should implement network-level DNS filtering and monitoring to detect and block unauthorized DNS configuration changes or suspicious DNS traffic. Employing DNSSEC validation can help mitigate DNS hijacking impacts. Segmentation of management interfaces away from untrusted networks and disabling remote management features can reduce exposure. Additionally, monitoring for indicators of compromise related to GhostDNS or similar malware activity is advised. Users should be educated about phishing risks stemming from DNS hijacking. Finally, organizations should engage with ISPs and vendors to ensure legacy device phase-out plans are accelerated.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-05T20:59:29.705Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695c2bac3839e441759217e3

Added to database: 1/5/2026, 9:22:52 PM

Last enriched: 3/5/2026, 9:14:42 AM

Last updated: 3/24/2026, 4:29:09 PM

Views: 193

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses