Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Exposes Kazuar Malware’s Modular P Details Malware’s
May 15, 2026
VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root
May 15, 2026
Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence
May 15, 2026
Home/CyberSecurity News/D-Link Router Command Injection Flaw Actively Explo
CyberSecurity News

D-Link Router Command Injection Flaw Actively Explo

D-Link has officially acknowledged unauthenticated command injection vulnerabilities impacting several of its Router Command Injectiondeployed globally. Active exploitation campaigns using DNS...

Sarah simpson
Sarah simpson
January 7, 2026 2 Min Read
15 0

D-Link has officially acknowledged unauthenticated command injection vulnerabilities impacting several of its Router Command Injectiondeployed globally.

Active exploitation campaigns using DNS hijacking have been documented since late 2016, with threat actors continuing malicious activities through 2019 and beyond.

Multiple D-Link router models remain vulnerable to remote DNS modification attacks through unauthenticated web interfaces.

The vulnerabilities allow attackers to change Domain Name Server settings without authentication, redirecting user traffic to malicious infrastructure.

Exploitation Campaign Details

Security researchers have documented ongoing exploitation campaigns targeting home users and enterprise networks across multiple continents.

The affected routers lack proper input validation in their web configuration interfaces, allowing attackers to manipulate critical network settings remotely.

This vulnerability class poses a significant risk for DNS hijacking, malware distribution, and traffic interception. An extensive malvertising campaign first reported in December 2016 targeted at least 166 router models across multiple manufacturers, including D-Link.

Threat actors leveraged DNS hijacking to redirect users toward malicious advertisement servers and phishing infrastructure.

Security researchers discovered that attackers maintained persistent control over compromised routers by modifying DNS configurations, effectively intercepting all user traffic.

By April 2019, threat intelligence teams documented ongoing DNS hijacking activities targeting D-Link routers for three consecutive months.

Attackers utilized Google Cloud Platform infrastructure to launch attacks, distributing the DNSChanger malware variant. The vulnerability’s severity increased as threat actors developed automation tools and publicly disclosed exploits.

Affected Products and Firmware Versions

The following D-Link router models contain unauthenticated DNS modification vulnerabilities:

Model Hardware Revision Region Affected Firmware CVE/Exploit-DB
DSL-2740R All Rev. A Europe EU v1.15 and older EDB-35917
DSL-2640B All Rev. T Malaysia GE v1.07 and older EDB-42197
DSL-2780B All Rev. A AU/NZ/EU v1.01.14 and older EDB-37237
DSL-526B All Rev. B Australia AU v2.01 and older EDB-37241

Note: These models are primarily deployed outside the United States through regional carriers using custom firmware configurations.

D-Link recommends users perform factory resets, establish unique administrative passwords, and manually configure DNS settings using trusted providers.

Contact your regional carrier for official firmware patches. Alternatively, configure DNS servers directly through the device’s web interface at http://192.168.0.1 using Google DNS (8.8.8.8) or Cloudflare DNS (1.1.1.1).

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitMalwarePatchphishingSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Hackers Exploited Routing & Misconfigurations to Spoof Or

Next Post

Critical Veeam Backup Vulnerabilities Allow Root RCE

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Next.js Flaw Exposes Cloud Vulnerability Credentials
May 15, 2026
OpenAI Confirms Security Breach from TanStack npm Attack
May 15, 2026
Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us