If you’re still running one of those dusty old D-Link DSL routers, there’s a good chance you’re playing a risky game of Russian roulette with your network. A critical flaw—CVE-2026-0625—has been chewing through legacy routers like candy since at least late 2025. And if the chorus of warnings from security researchers and the angry tweets from hacked users haven't gotten your attention yet, well, maybe this will.
The Anatomy of a Blunder: What Went Wrong?
This particular screw-up lives in the dnscfg.cgi endpoint, a part of the router’s web interface responsible for DNS configuration. Nothing fancy here. Just good, old-fashioned ‘forgot to sanitize user input’—the bread and butter of bad security stories since the dawn of internet time. It lets attackers slip in carefully crafted shell commands without needing any kind of authentication. Basically: point, command, compromise.
The models affected? DSL-526B, DSL-2640B, DSL-2740R, and DSL-2780B. If your firmware is old (and let’s face it, if you’re using these routers, it almost certainly is), your router is a sitting duck. These aren’t obscure models found hiding in deep storage closets, either. They’re still out there, stubbornly blinking away in homes and businesses.
No Lifeline from D-Link: When Support Dies, So Does Security
D-Link, like any other vendor, doesn’t want to support 15-year-old hardware. Can you blame them? The hardware is end-of-life (EOL) and well past its warranty. They won’t patch your router. They won’t even answer your emails. If you’re still hoping for a firmware update to save you, keep dreaming.
Why is this such a big deal? Because network hardware, unlike your smartphone or laptop, has a nasty habit of being plugged in, set aside, and utterly forgotten. It blends into the background. As long as the internet light is glowing, nobody gives it a second thought until it’s turned against you.
How the Bad Guys Get In—and What They Do Once Inside
The Shadowserver Foundation, one of the better-known nonprofit watchdogs, spotted active exploitation as far back as November 27, 2025. Here’s what attackers can do once they get their claws into your router:
- Install malware or ransomware that could hold your data hostage
- Intercept, snoop, or redirect all your internet traffic—goodbye, privacy
- Use your router as a jumping-off point to attack every device in your network
- Draft your router into a botnet for DDoS attacks, turning your hardware into a digital thug-for-hire
- Steal whatever data they fancy moving through your home or business network
Compromised routers are a goldmine. They’re quiet, always-on, rarely monitored, and often carry the keys to the rest of your digital kingdom. Don’t assume attackers care who you are—they just want your device’s CPU on their side.
Why People Still Run Unsupported Routers (and Why Attackers Love That)
Let’s be honest: The real story isn’t the line in a firmware changelog or the obscure CVE listing. It’s the sheer inertia that keeps old devices alive. Maybe you’re in a rural area where tech upgrades come last, or maybe nobody at your office ever wanted to mess with the Wi-Fi after that one intern set it up years ago. Whatever the reason, old hardware tends to stick around way, way longer than it should.
Attackers bet on that. They know there’s an army of unsupported routers out there, quietly doing their thing, getting more vulnerable by the day. You can find guides on forums dedicated to running ancient routers on shoestring budgets. Some folks even hoard them for nostalgia. Let’s not kid ourselves: nostalgia is not a security strategy.
No Patch? No Mercy. What You Can Do
So, what’s D-Link’s advice? Rip and replace. "Please retire and replace these models with newer, supported alternatives," they plead (in more corporate language, of course). There’s no patch, no grace period, no clever workaround. You could try DIY firewalls and network segmentation as an extra shield, but if you haven’t swapped out your router in a decade, odds are you won’t bother with advanced technical fixes now.
Still not convinced? Here’s what ignoring this warning usually gets you:
- Sudden, mysterious slowdowns on your internet connection
- Unexpected—the truly hair-pulling kind—network outages
- Your home network used as a launchpad for attacks on others (hello, ISP warning letters!)
- More spam and phishing, courtesy of bad neighbors sharing your vulnerable gateway
Security Theater Is Getting Old—So Are Your Routers
Here’s the unvarnished truth: every piece of code, every device, every web-facing port—none of it ages well. Vendors love to tout new features and glossy dashboards, but when hardware hits EOL, that’s it. No more love. The device becomes a liability overnight. Security professionals keep repeating the same broken record: patch, update, upgrade, retire. Yet millions of routers, especially those “set-and-forget” devices, soldier on.
Tech folklore tells us to “never touch a running system.” Problem is, attackers don’t care if it’s still running. They only care that it’s still vulnerable after everyone else has forgotten about it. Legacy routers will keep showing up in breach reports until people finally decide their security—or their sanity—is worth more than that 2009 login page.
If your router’s on this list, stop hoping for a miracle. Change it, toss it, smash it with a hammer, whatever works for you. But don’t say nobody warned you when the inevitable happens. Your network isn’t getting any younger, and neither is your luck.


