Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2163: Command Injection in D-Link DIR-600

0
Medium
VulnerabilityCVE-2026-2163cvecve-2026-2163
Published: Sun Feb 08 2026 (02/08/2026, 16:32:09 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-600

Description

CVE-2026-2163 is a medium-severity command injection vulnerability affecting the D-Link DIR-600 router firmware version 2. 15WWb02 and earlier. The flaw exists in the ssdp. cgi component, where manipulation of HTTP_ST, REMOTE_ADDR, REMOTE_PORT, or SERVER_ID arguments can lead to remote command execution without user interaction or authentication. Although the affected product is no longer supported and no patches are available, the exploit code is publicly accessible, increasing the risk of exploitation. The vulnerability allows attackers to execute arbitrary commands on the device, potentially compromising network integrity and confidentiality. European organizations using this outdated router model may face risks, especially in small office or home office environments. Mitigation is complicated by the lack of vendor support, requiring network segmentation, device replacement, or strict access controls. Countries with higher D-Link market penetration and significant SME usage, such as Germany, France, and the UK, are more likely to be impacted. Given the medium CVSS score and the absence of known exploits in the wild, the threat remains moderate but should not be ignored due to the ease of remote exploitation and potential network exposure.

AI-Powered Analysis

AILast updated: 02/08/2026, 17:16:02 UTC

Technical Analysis

CVE-2026-2163 identifies a command injection vulnerability in the D-Link DIR-600 router firmware up to version 2.15WWb02, specifically within the ssdp.cgi file. The vulnerability arises when an attacker manipulates certain HTTP arguments—HTTP_ST, REMOTE_ADDR, REMOTE_PORT, or SERVER_ID—leading to the injection and execution of arbitrary system commands on the device. This attack vector does not require user interaction or authentication, making it remotely exploitable over the network. The vulnerability affects devices that are no longer supported by D-Link, meaning no official patches or firmware updates are available to remediate the issue. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction, but limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, public exploit code exists, increasing the risk of future attacks. The affected device is commonly used in home and small office environments, where it may serve as a gateway to internal networks. Successful exploitation could allow attackers to execute arbitrary commands, potentially leading to device compromise, network reconnaissance, or pivoting attacks. The lack of vendor support complicates mitigation, necessitating alternative security controls or device replacement.

Potential Impact

For European organizations, particularly small and medium enterprises (SMEs) and home office users relying on the D-Link DIR-600 router, this vulnerability poses a tangible risk of unauthorized remote command execution. Exploitation could lead to full device compromise, enabling attackers to intercept or manipulate network traffic, deploy malware, or establish persistent footholds within internal networks. This threatens confidentiality by exposing sensitive data, integrity by allowing manipulation of network configurations or data flows, and availability if the device is rendered inoperable or used in denial-of-service attacks. Given the device's typical deployment at network perimeters, compromised routers could serve as launch points for broader attacks against organizational infrastructure. The absence of vendor patches increases the risk exposure duration, especially in environments where device replacement is delayed. Additionally, the public availability of exploit code lowers the barrier for attackers, including opportunistic cybercriminals and potentially state-sponsored actors targeting European networks. The impact is heightened in countries with widespread use of this router model and where network security hygiene may be less rigorous.

Mitigation Recommendations

Since the affected D-Link DIR-600 devices are no longer supported and no official patches exist, organizations should prioritize device replacement with modern, supported hardware that receives regular security updates. In the interim, network administrators should implement strict network segmentation to isolate vulnerable routers from critical infrastructure and sensitive data. Deploying firewall rules to restrict inbound access to router management interfaces and SSDP services from untrusted networks can reduce exposure. Monitoring network traffic for unusual patterns or command injection attempts targeting ssdp.cgi parameters is advisable. Employing intrusion detection/prevention systems (IDS/IPS) with signatures tuned for this vulnerability can help detect exploitation attempts. Additionally, disabling SSDP or UPnP services on the router, if feasible, can mitigate the attack surface. Organizations should also conduct asset inventories to identify affected devices and prioritize their remediation or replacement. User education on the risks of outdated network equipment and enforcing policies against using unsupported devices in corporate environments will further reduce risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T09:06:36.248Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6988c15b4b57a58fa1b5b391

Added to database: 2/8/2026, 5:01:15 PM

Last enriched: 2/8/2026, 5:16:02 PM

Last updated: 2/8/2026, 6:04:15 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats