CVE-2026-0625Missing Authentication for Critical Function in D-link Dir-600

Severity
9.3CRITICALNVD
EPSS
0.7%
top 27.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 5
Latest updateJan 6

Description

Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality. By directly requesting this endpoint, an attacker can modify the device’s DNS settings without valid credentials, enabling DNS hijacking (“DNSChanger”) attacks that redirect user traffic to attacker-controlled infrastructure. In 2019, D-Link reported that this behavior was lever

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages17 packages

CVEListV5d-link/dir-6000
CVEListV5d-link/dir-6080
CVEListV5d-link/dir-6100
CVEListV5d-link/dir-6110
CVEListV5d-link/dir-6150

🔴Vulnerability Details

3
GHSA
GHSA-v9p2-66r4-9qhr: Multiple D-Link DSL gateway devices contain a command injection vulnerability in the dnscfg2026-01-06
CVEList
D-Link DSL/DIR/DNS Command Injection via DNS Configuration Endpoint2026-01-05
VulnCheck
D-Link dir-600_firmware Missing Authentication for Critical Function2026
CVE-2026-0625 — D-link Dir-600 vulnerability | cvebase