A security vulnerability was found on an older D-Link DSL router.
A security vulnerability was found on an older D-Link DSL router. Hackers are very active.
In this era, it can be understood that anything is economical, which hardware is functional, which is used instead of upgrading, but many hardware or accessories, if not changed, can be dangerous because there are often no more updates to strengthen new security, causing new detected vulnerabilities to touch the mind of hackers.
According to a report by The Hacker News website, a very high danger vulnerability has been detected on an older DSL series of D-Link routers. The vulnerability is coded CVE-2026-0625, a vulnerability with a danger rating, or CVSS Score of 9.3, which is almost the most dangerous. This vulnerability is a botched data cleaning type vulnerability, or Improper Sanitization in terms of configuration parameters. The DNS value allows hackers to launch commands (Command Injection) into a router setup file called "dnscfg.cgi," resulting in hackers being able to attack. System with Remote Code Execution (RCE or Remote Code Execution) for logging into the victim's system or installing malware.
A research team from VulnCheck, a security vulnerability research expert organization, revealed that routers in the affected DSL series have been in product expiration or EoL (End-of-Life) since the early 2020s. The router version and the affected firmware version are as follows:
DSL-2640B Firmware from version 1.07 down
DSL-2740R Firmware version below 1.17
DSL-2780B Firmware from version 1.01.14 down
DSL-526B Firmware from version 2.01 down
After the D-Link received a report from the research team during December 2025 (D & C (2025) D-Link immediately investigated the problem because the report indicates that the vulnerability has been detected by hackers. The audit covers the smuggling of CGI Library on both past and latest products, but no firmware or updates have been confirmed to strengthen security on affected models that have somehow gone out of range of security support. Therefore, the research team has commented that it may be time for users to phase out devices that have gone out of range of security support and buy the latest ones. Instead, for the safety of the system as a whole, especially for enterprise users, where the safety of the system is very important.
# Trending # Lemon 8 Howtoo # Drug sign with lemon8 # lemon 8 diary # freedomhack







































































































