Active Exploitation Hits Legacy D-Link DSL Routers

Related

Pentagon CIO Kirsten Davies Announces New Team Appointments

What happened Pentagon Chief Information Officer Kirsten Davies announced several...

Carnival Corporation Probes Data Breach After Claims of 8.7 Million Records Theft

What happened Carnival Corporation is investigating a potential data breach...

Grinex Exchange Blames Western Intelligence for $13.7M Crypto Hack

What happened Kyrgyzstan-based cryptocurrency exchange Grinex suspended operations on April...

Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

What happened Sophos researchers have documented two active campaigns in...

Share

What happened

An active exploitation campaign targets legacy D-Link DSL routers, using a remote code execution flaw in devices with outdated firmware. Security firm Tenable confirmed that attackers leverage exposed HTTP interfaces and default credentials to execute commands remotely. Exploited routers may become part of botnets, intercept traffic, or serve as pivot points for attacks on internal networks. Affected models include D-Link DSL-2640B, DSL-2750B, and other end-of-life devices still in operational use.

Who is affected

Users of legacy D-Link DSL routers, including small businesses and residential networks, are directly at risk, while connected enterprise systems may face indirect exposure.

Why CISOs should care

Unpatched network hardware presents persistent attack vectors for lateral movement, malware propagation, and operational disruption.

3 practical actions

Update firmware: Apply vendor firmware patches where available.

Retire end-of-life devices: Replace legacy routers with supported, secure models.

Network monitoring: Detect unusual router activity, including unexpected logins and outbound traffic.