Active Exploitation Hits Legacy D-Link DSL Routers

Related

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Return Fraud Startup Pinch AI Raises $5M to Help Retailers Protect Margins

What happened Return‑fraud detection startup Pinch AI has secured $5...

AI Hiring Startup AINA Raises $1M Seed to Bring Order to Talent Chaos

What happened AINA, a Limassol‑based AI hiring platform, has secured...

Share

What happened

An active exploitation campaign targets legacy D-Link DSL routers, using a remote code execution flaw in devices with outdated firmware. Security firm Tenable confirmed that attackers leverage exposed HTTP interfaces and default credentials to execute commands remotely. Exploited routers may become part of botnets, intercept traffic, or serve as pivot points for attacks on internal networks. Affected models include D-Link DSL-2640B, DSL-2750B, and other end-of-life devices still in operational use.

Who is affected

Users of legacy D-Link DSL routers, including small businesses and residential networks, are directly at risk, while connected enterprise systems may face indirect exposure.

Why CISOs should care

Unpatched network hardware presents persistent attack vectors for lateral movement, malware propagation, and operational disruption.

3 practical actions

Update firmware: Apply vendor firmware patches where available.

Retire end-of-life devices: Replace legacy routers with supported, secure models.

Network monitoring: Detect unusual router activity, including unexpected logins and outbound traffic.