<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>D-Link — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/d-link/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 09:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/d-link/feed.xml" rel="self" type="application/rss+xml"/><item><title>D-Link DI-8100 Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-di-8100-bo/</link><pubDate>Tue, 28 Apr 2026 09:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-di-8100-bo/</guid><description>A buffer overflow vulnerability in the D-Link DI-8100 router allows remote attackers to execute arbitrary code by manipulating the 'fn' argument in the tgfile_htm function of the CGI endpoint.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7248, affects the D-Link DI-8100 router, specifically version 16.07.26A1. The vulnerability resides within the <code>tgfile_htm</code> function of the <code>tgfile.htm</code> file, a component of the CGI endpoint. By crafting a malicious request targeting the <code>fn</code> argument, a remote, unauthenticated attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. This vulnerability is particularly concerning as a proof-of-concept exploit has been publicly released, increasing the likelihood of exploitation. Routers are often targeted due to their exposure to the internet and the potential to compromise entire networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DI-8100 router running firmware version 16.07.26A1.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>tgfile.htm</code> CGI endpoint.</li>
<li>The malicious request includes an overly long string in the <code>fn</code> argument.</li>
<li>The router&rsquo;s web server processes the request and passes the <code>fn</code> argument to the <code>tgfile_htm</code> function.</li>
<li>The <code>tgfile_htm</code> function fails to properly validate the length of the <code>fn</code> argument.</li>
<li>A buffer overflow occurs when the overly long <code>fn</code> argument is copied into a fixed-size buffer.</li>
<li>The buffer overflow overwrites adjacent memory, potentially including return addresses or other critical data.</li>
<li>The attacker gains arbitrary code execution on the router, potentially allowing them to take full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to remotely execute arbitrary code on the D-Link DI-8100 router. This could lead to a complete compromise of the device, allowing the attacker to intercept network traffic, modify router settings, or use the router as a launchpad for further attacks against other devices on the network. Given the public availability of an exploit, widespread exploitation is possible, potentially affecting numerous home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for abnormally long <code>fn</code> parameters in requests to <code>/tgfile.htm</code> using the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Implement rate limiting on HTTP requests to the router&rsquo;s web interface to mitigate brute-force exploitation attempts.</li>
<li>Since the source material only identifies a vulnerability, without a patch, consider replacing the affected device.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7248</category><category>buffer-overflow</category><category>d-link</category><category>router</category></item><item><title>D-Link DIR-605L Router Buffer Overflow Vulnerability (CVE-2026-5980)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-buffer-overflow/</link><pubDate>Thu, 09 Apr 2026 21:16:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in the D-Link DIR-605L router version 2.13B01, allowing a remote attacker to execute arbitrary code by manipulating the `curTime` argument in the `formSetMACFilter` function.</description><content:encoded><![CDATA[<p>CVE-2026-5980 is a critical buffer overflow vulnerability affecting the D-Link DIR-605L router, specifically version 2.13B01. The vulnerability resides in the <code>formSetMACFilter</code> function within the <code>/goform/formSetMACFilter</code> component&rsquo;s POST Request Handler. A remote attacker can exploit this by sending a crafted POST request with a malicious <code>curTime</code> argument, leading to a buffer overflow. Exploit code is publicly available. Due to the product&rsquo;s end-of-life status, no patch is available, making unpatched devices highly vulnerable. This allows for potential remote code execution and complete compromise of the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-605L router (version 2.13B01) exposed to the internet.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/goform/formSetMACFilter</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>curTime</code> parameter, injecting a string exceeding the buffer&rsquo;s expected size.</li>
<li>The router&rsquo;s <code>formSetMACFilter</code> function processes the POST request without proper bounds checking on the <code>curTime</code> argument.</li>
<li>The oversized <code>curTime</code> string overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite critical data, such as return addresses or function pointers.</li>
<li>When the <code>formSetMACFilter</code> function attempts to return, the overwritten return address is used, redirecting execution to attacker-controlled code.</li>
<li>The attacker gains arbitrary code execution on the router, potentially installing malware, changing configurations, or using the device for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5980 allows a remote attacker to gain complete control over the vulnerable D-Link DIR-605L router. Given that the affected product is no longer supported, a large number of legacy routers remain vulnerable. Attackers can leverage compromised routers to establish botnets, conduct man-in-the-middle attacks, or gain unauthorized access to internal networks connected to the router. The lack of patches elevates the severity, as affected users have no direct mitigation available other than replacing the device.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect D-Link DIR-605L Buffer Overflow Attempt</code> to identify malicious POST requests targeting the <code>/goform/formSetMACFilter</code> endpoint on D-Link DIR-605L devices.</li>
<li>Implement network segmentation to isolate potentially vulnerable D-Link DIR-605L routers to limit the impact of a successful compromise.</li>
<li>If possible, replace D-Link DIR-605L routers (version 2.13B01) with newer, supported devices to eliminate the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>buffer_overflow</category><category>router</category><category>d-link</category></item><item><title>D-Link DIR-882 Remote Command Injection Vulnerability (CVE-2026-5844)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-command-injection/</link><pubDate>Thu, 09 Apr 2026 05:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-command-injection/</guid><description>A command injection vulnerability (CVE-2026-5844) exists in the D-Link DIR-882 router version 1.01B02, allowing a remote attacker to execute arbitrary OS commands by manipulating the IPAddress argument in the HNAP1 SetNetworkSettings Handler via the prog.cgi script.</description><content:encoded><![CDATA[<p>CVE-2026-5844 describes a critical command injection vulnerability affecting D-Link DIR-882 routers running firmware version 1.01B02. The vulnerability resides in the <code>sprintf</code> function within the <code>prog.cgi</code> script, specifically within the HNAP1 SetNetworkSettings Handler. A remote, unauthenticated attacker can exploit this flaw by manipulating the <code>IPAddress</code> argument, injecting arbitrary OS commands that are then executed with elevated privileges. The vulnerability is considered critical due to the potential for complete system compromise and the availability of a public exploit. This vulnerability impacts products that are no longer supported by the maintainer, increasing the risk for users who have not migrated to newer devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-882 router running firmware version 1.01B02.</li>
<li>The attacker sends a crafted HTTP request to the <code>prog.cgi</code> endpoint.</li>
<li>The HTTP request targets the HNAP1 SetNetworkSettings Handler.</li>
<li>The attacker manipulates the <code>IPAddress</code> argument within the HTTP request, injecting malicious OS commands.</li>
<li>The <code>sprintf</code> function in <code>prog.cgi</code> processes the attacker-controlled <code>IPAddress</code> argument without proper sanitization.</li>
<li>The injected OS commands are executed on the router&rsquo;s operating system due to the command injection vulnerability in <code>sprintf</code>.</li>
<li>The attacker gains remote code execution on the router.</li>
<li>The attacker can then perform actions such as modifying router settings, eavesdropping on network traffic, or using the router as a botnet node.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5844 allows a remote attacker to execute arbitrary OS commands on the vulnerable D-Link DIR-882 router. This can lead to a complete compromise of the device, enabling attackers to reconfigure the router, intercept network traffic, or use the compromised device as part of a botnet. The vulnerability affects end-of-life products, meaning no official patches are available. The impact is significant due to the widespread use of these routers in home and small business networks, where they can act as a gateway to internal systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect D-Link DIR-882 Command Injection Attempt</code> to detect suspicious requests to <code>prog.cgi</code> containing shell metacharacters.</li>
<li>Block access to the URL <code>https://files.catbox.moe/ei31k1.zip</code> to prevent the download of the publicly available exploit (IOC).</li>
<li>Monitor web server logs for HTTP requests to <code>prog.cgi</code> with unusually long <code>IPAddress</code> parameters (log source: webserver).</li>
<li>Implement network intrusion detection systems (IDS) rules to identify and block exploit attempts targeting CVE-2026-5844 (log source: network_connection).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>d-link</category><category>router</category><category>cve-2026-5844</category></item><item><title>D-LINK Router M60 and DIR-3040 'Airsnitch' Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-router-vulnerability/</link><pubDate>Wed, 08 Apr 2026 09:58:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-router-vulnerability/</guid><description>The 'Airsnitch' vulnerability in D-LINK Router M60 and DIR-3040 allows an attacker from an adjacent network to bypass security measures, disclose confidential information, and manipulate network traffic.</description><content:encoded><![CDATA[<p>The &lsquo;Airsnitch&rsquo; vulnerability affects D-LINK Router models M60 and DIR-3040. An attacker positioned within an adjacent network can exploit this flaw to circumvent security protocols. This access allows the attacker to potentially expose sensitive data and manipulate network traffic. The specifics of the vulnerability exploitation are not detailed in this advisory, but the impact suggests a significant compromise of network security and data integrity. Defenders should prioritize identifying and mitigating this vulnerability to prevent unauthorized access and data breaches. This vulnerability poses a risk to both home and enterprise networks utilizing the affected D-LINK router models.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to an adjacent network, either physically or via compromised wireless access.</li>
<li>Attacker sends crafted network packets targeting the D-LINK router&rsquo;s management interface.</li>
<li>The &lsquo;Airsnitch&rsquo; vulnerability is exploited, bypassing authentication or authorization checks.</li>
<li>Attacker gains unauthorized access to the router&rsquo;s configuration settings.</li>
<li>Attacker modifies DNS settings to redirect traffic to malicious servers.</li>
<li>Attacker intercepts and analyzes network traffic, capturing sensitive information like usernames and passwords.</li>
<li>Attacker injects malicious code into network traffic, potentially compromising other devices on the network.</li>
<li>Attacker maintains persistent access by creating a rogue administrator account or installing malicious firmware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the &lsquo;Airsnitch&rsquo; vulnerability can lead to significant compromise of network security. Attackers can gain unauthorized access to sensitive information, manipulate network traffic, and potentially compromise other devices on the network. This can result in data breaches, financial losses, and reputational damage. The number of potential victims is significant, given the widespread use of D-LINK routers in both home and enterprise environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Analyze network traffic for suspicious patterns indicative of unauthorized access attempts to the D-LINK router&rsquo;s management interface to facilitate tuning of existing firewall rules and creation of new rules.</li>
<li>Monitor DNS settings on D-LINK routers for unauthorized modifications using network monitoring tools.</li>
<li>Implement strict access control policies on the adjacent network to limit the attacker&rsquo;s ability to reach the D-LINK routers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>d-link</category><category>router</category><category>airsnitch</category><category>vulnerability</category><category>network-traffic-manipulation</category></item><item><title>D-Link DIR-825 Buffer Overflow Vulnerability in miniupnpd</title><link>https://feed.craftedsignal.io/briefs/2024-01-dlink-dir825-buffer-overflow/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dlink-dir825-buffer-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-7069) exists in the AddPortMapping function of the miniupnpd component within D-Link DIR-825 routers (up to version 3.00b32), potentially enabling attackers on the local network to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7069, has been discovered in D-Link DIR-825 routers with firmware versions up to 3.00b32. The vulnerability resides within the <code>AddPortMapping</code> function of the <code>upnpsoap.c</code> file, part of the <code>miniupnpd</code> component. An attacker on the local network can exploit this vulnerability by manipulating the <code>NewPortMappingDescription</code> argument, leading to a buffer overflow. Given that the exploit is publicly available, the risk of exploitation is elevated. This vulnerability is especially critical as it affects end-of-life products, meaning that official patches are unlikely to be released.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the local network, either through physical access or compromising a device on the network.</li>
<li>The attacker identifies a vulnerable D-Link DIR-825 router running a firmware version up to 3.00b32.</li>
<li>The attacker crafts a malicious SOAP request targeting the UPnP service on the router.</li>
<li>The crafted request includes a <code>NewPortMappingDescription</code> argument with a payload exceeding the buffer&rsquo;s capacity in the <code>AddPortMapping</code> function within <code>upnpsoap.c</code>.</li>
<li>The router&rsquo;s <code>miniupnpd</code> component processes the SOAP request, triggering the buffer overflow when writing the overly long <code>NewPortMappingDescription</code>.</li>
<li>The buffer overflow overwrites adjacent memory locations, potentially including critical function pointers or return addresses.</li>
<li>The attacker redirects execution flow to malicious code injected into the overflowed buffer.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control of the device or using it as a pivot point to attack other devices on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7069 allows an attacker on the local network to execute arbitrary code on the vulnerable D-Link DIR-825 router. This can lead to complete compromise of the router, allowing the attacker to eavesdrop on network traffic, modify DNS settings, or use the router to launch attacks against other devices within the network or on the internet. Given the end-of-life status of the affected devices, a large number of potentially vulnerable routers may remain in use, making this a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Disable UPnP on D-Link DIR-825 routers where possible to prevent exploitation of CVE-2026-7069.</li>
<li>Monitor network traffic for suspicious SOAP requests targeting the UPnP service (miniupnpd) on internal network devices using a network intrusion detection system (NIDS). Deploy the Sigma rule targeting HTTP POST requests to the UPnP service.</li>
<li>Segment networks to limit the impact of a compromised router in case of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>cve</category><category>miniupnpd</category><category>d-link</category></item></channel></rss>