The vulnerability, tracked as
CVE-2026-0625 (CVSS score: 9.3), concerns a case of command injection in the "dnscfg.cgi" endpoint that arises as a result of improper sanitization of user-supplied DNS configuration parameters.
"CVE-2026-0625 exposes the same DNS configuration mechanism leveraged in past large-scale DNS hijacking campaigns," Field Effect
said. "
The vulnerability enables unauthenticated remote code execution via the dnscfg.cgi endpoint, giving attackers direct control over DNS settings without credentials or user interaction."
"Once altered, DNS entries can silently redirect, intercept, or block downstream traffic, resulting in a persistent compromise
affecting every device behind the router.
A critical flaw in legacy D-Link DSL routers lets unauthenticated attackers run commands and hijack DNS, with active exploitation reported.
thehackernews.com