Home

Description

Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality. By directly requesting this endpoint, an attacker can modify the device’s DNS settings without valid credentials, enabling DNS hijacking (“DNSChanger”) attacks that redirect user traffic to attacker-controlled infrastructure. In 2019, D-Link reported that this behavior was leveraged by the "GhostDNS" malware ecosystem targeting consumer and carrier routers. All impacted products were subsequently designated end-of-life/end-of-service, and no longer receive security updates. Exploitation evidence was observed by the Shadowserver Foundation on 2025-11-27 (UTC).

PUBLISHED Reserved 2026-01-05 | Published 2026-01-05 | Updated 2026-01-20 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Credits

The Shadowserver Foundation finder

VulnCheck coordinator

References

supportannouncement.us.dlink.com/...ation.aspx?name=SAP10488 vendor-advisory mitigation

supportannouncement.us.dlink.com/...ation.aspx?name=SAP10068 vendor-advisory

supportannouncement.us.dlink.com/...ation.aspx?name=SAP10118 vendor-advisory

www.vulncheck.com/...njection-via-dns-configuration-endpoint third-party-advisory

cve.org (CVE-2026-0625)

nvd.nist.gov (CVE-2026-0625)

Download JSON