<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>D-Link — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/d-link/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 15:16:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/d-link/feed.xml" rel="self" type="application/rss+xml"/><item><title>D-Link DIR-825M Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-buffer-overflow/</link><pubDate>Tue, 28 Apr 2026 15:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-buffer-overflow/</guid><description>D-Link DIR-825M version 1.1.12 is vulnerable to a buffer overflow via manipulation of the submit-url argument in the /boafrm/formWanConfigSetup file's sub_414BA8 function, allowing a remote attacker to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability exists in D-Link DIR-825M router version 1.1.12. The vulnerability is located within the <code>sub_414BA8</code> function of the <code>/boafrm/formWanConfigSetup</code> file. An attacker can exploit this flaw by manipulating the <code>submit-url</code> argument, leading to arbitrary code execution on the device. This vulnerability is remotely exploitable, and a proof-of-concept exploit is publicly available, increasing the risk of widespread attacks. Exploitation does not require authentication by default, and could allow an attacker to gain complete control over the device. This poses a significant threat to home and small business networks relying on this router model.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-825M router running firmware version 1.1.12.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/boafrm/formWanConfigSetup</code> endpoint.</li>
<li>The attacker includes the <code>submit-url</code> argument in the POST request, injecting a buffer overflow payload.</li>
<li>The crafted payload overflows the buffer in the <code>sub_414BA8</code> function during the processing of the <code>submit-url</code> argument.</li>
<li>The buffer overflow overwrites critical memory regions, including the return address.</li>
<li>When the <code>sub_414BA8</code> function returns, control is redirected to the attacker-controlled address.</li>
<li>The attacker&rsquo;s payload executes arbitrary code, potentially downloading and executing a secondary payload.</li>
<li>The attacker gains remote shell access to the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the D-Link DIR-825M router. This can lead to complete compromise of the device, allowing the attacker to eavesdrop on network traffic, modify router settings, or use the router as a botnet node for further malicious activities. Given the widespread use of D-Link routers in home and small business networks, a successful attack could compromise a large number of devices and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates from D-Link to patch CVE-2026-7289.</li>
<li>Deploy the following Sigma rule to detect suspicious POST requests to <code>/boafrm/formWanConfigSetup</code> with overly long <code>submit-url</code> parameters.</li>
<li>Monitor web server logs for suspicious activity related to the <code>/boafrm/formWanConfigSetup</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>dlink</category><category>cve</category></item><item><title>D-Link DI-8100 Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-di-8100-bo/</link><pubDate>Tue, 28 Apr 2026 09:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-di-8100-bo/</guid><description>A buffer overflow vulnerability in the D-Link DI-8100 router allows remote attackers to execute arbitrary code by manipulating the 'fn' argument in the tgfile_htm function of the CGI endpoint.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7248, affects the D-Link DI-8100 router, specifically version 16.07.26A1. The vulnerability resides within the <code>tgfile_htm</code> function of the <code>tgfile.htm</code> file, a component of the CGI endpoint. By crafting a malicious request targeting the <code>fn</code> argument, a remote, unauthenticated attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. This vulnerability is particularly concerning as a proof-of-concept exploit has been publicly released, increasing the likelihood of exploitation. Routers are often targeted due to their exposure to the internet and the potential to compromise entire networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DI-8100 router running firmware version 16.07.26A1.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>tgfile.htm</code> CGI endpoint.</li>
<li>The malicious request includes an overly long string in the <code>fn</code> argument.</li>
<li>The router&rsquo;s web server processes the request and passes the <code>fn</code> argument to the <code>tgfile_htm</code> function.</li>
<li>The <code>tgfile_htm</code> function fails to properly validate the length of the <code>fn</code> argument.</li>
<li>A buffer overflow occurs when the overly long <code>fn</code> argument is copied into a fixed-size buffer.</li>
<li>The buffer overflow overwrites adjacent memory, potentially including return addresses or other critical data.</li>
<li>The attacker gains arbitrary code execution on the router, potentially allowing them to take full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to remotely execute arbitrary code on the D-Link DI-8100 router. This could lead to a complete compromise of the device, allowing the attacker to intercept network traffic, modify router settings, or use the router as a launchpad for further attacks against other devices on the network. Given the public availability of an exploit, widespread exploitation is possible, potentially affecting numerous home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for abnormally long <code>fn</code> parameters in requests to <code>/tgfile.htm</code> using the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Implement rate limiting on HTTP requests to the router&rsquo;s web interface to mitigate brute-force exploitation attempts.</li>
<li>Since the source material only identifies a vulnerability, without a patch, consider replacing the affected device.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7248</category><category>buffer-overflow</category><category>d-link</category><category>router</category></item><item><title>D-Link DIR-822 A_101 Command Injection via DHCP Hostname</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-dir822-cmd-injection/</link><pubDate>Mon, 27 Apr 2026 00:20:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-dir822-cmd-injection/</guid><description>A command injection vulnerability exists in D-Link DIR-822 A_101, specifically within the udhcpd DHCP service; by manipulating the Hostname argument, a remote attacker can inject commands, but the affected product is no longer supported.</description><content:encoded><![CDATA[<p>A command injection vulnerability, tracked as CVE-2026-7067, has been identified in D-Link DIR-822 hardware with firmware version A_101. The vulnerability lies within the udhcpd DHCP service, specifically in the handling of the Hostname argument in the /udhcpcd/dhcpd.c file. A remote attacker can exploit this flaw by injecting arbitrary commands through a crafted Hostname field in a DHCP request. While a proof-of-concept exploit is publicly available, this vulnerability is less impactful because the D-Link DIR-822 A_101 is no longer supported by the vendor, potentially limiting the number of affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-822 A_101 device.</li>
<li>The attacker crafts a malicious DHCP request containing a command injection payload in the Hostname field.</li>
<li>The attacker sends the crafted DHCP request to the vulnerable device.</li>
<li>The udhcpd service parses the DHCP request and extracts the Hostname.</li>
<li>Due to insufficient input validation, the injected command within the Hostname is passed to the <code>system</code> function.</li>
<li>The <code>system</code> function executes the injected command with the privileges of the udhcpd process (typically root).</li>
<li>The attacker achieves arbitrary code execution on the device.</li>
<li>The attacker can then perform actions such as gaining persistent access, modifying device configuration, or using the device as part of a botnet.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this command injection vulnerability allows a remote, unauthenticated attacker to execute arbitrary code on the affected D-Link DIR-822 A_101 device. Given the end-of-life status of the product, patching is unlikely, leaving devices vulnerable. An attacker could leverage this vulnerability to gain complete control of the router, potentially compromising networks connected to it. The specific number of vulnerable devices is unknown, but the impact could be significant if many devices remain in use.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect command injection attempts via DHCP Hostname (Sigma rule: <code>DHCP Hostname Command Injection</code>).</li>
<li>Monitor network traffic for suspicious DHCP requests containing unusual characters or command sequences in the Hostname field, using network monitoring tools.</li>
<li>Consider network segmentation to isolate potentially vulnerable D-Link DIR-822 A_101 devices from critical network resources.</li>
<li>If replacement is not immediately feasible, implement strict access control lists on the firewall to limit access to the D-Link DIR-822 A_101 device&rsquo;s management interface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>dhcp</category><category>iot</category></item><item><title>D-Link DWM-222W USB Wi-Fi Adapter Brute-Force Protection Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-brute-force-bypass/</link><pubDate>Fri, 24 Apr 2026 04:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-brute-force-bypass/</guid><description>D-Link DWM-222W USB Wi-Fi Adapter is vulnerable to brute-force attacks due to a protection bypass, allowing unauthenticated adjacent network attackers to gain control over the device by circumventing login attempt limits.</description><content:encoded><![CDATA[<p>The D-Link DWM-222W USB Wi-Fi Adapter is susceptible to a brute-force protection bypass vulnerability (CVE-2026-6947). This flaw allows an attacker on an adjacent network to circumvent the built-in login attempt limits. By repeatedly attempting different credentials without being blocked, an attacker can successfully brute-force the password and gain unauthorized access to the device. This vulnerability poses a significant risk as it enables attackers to potentially reconfigure the device, intercept network traffic, or use the compromised device as a pivot point for further attacks within the network. Successful exploitation leads to full control over the D-Link Wi-Fi adapter.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker locates a vulnerable D-Link DWM-222W USB Wi-Fi Adapter within adjacent network range.</li>
<li>The attacker initiates network communication with the device, targeting its login interface, likely via HTTP or HTTPS.</li>
<li>The attacker sends a series of login requests with different username and password combinations.</li>
<li>Due to the brute-force protection bypass, the device does not enforce login attempt limits or implement account lockout mechanisms.</li>
<li>The attacker continues sending login requests until the correct credentials are found.</li>
<li>Upon successful authentication, the attacker gains administrative access to the D-Link DWM-222W USB Wi-Fi Adapter&rsquo;s configuration interface.</li>
<li>The attacker reconfigures the device to their specifications potentially enabling remote access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6947 allows an attacker to gain complete control over the D-Link DWM-222W USB Wi-Fi Adapter. This can lead to unauthorized access to the network it connects to, data interception, or the device being used as a launchpad for further attacks within the network. The impact is significant, as it bypasses standard security measures and grants full administrative privileges to the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for excessive authentication attempts targeting the D-Link DWM-222W USB Wi-Fi Adapter to detect potential brute-force attacks. Deploy the Sigma rule <code>Detect Excessive Authentication Attempts</code> to identify such activity.</li>
<li>Implement network segmentation to limit the impact of a compromised D-Link DWM-222W USB Wi-Fi Adapter.</li>
<li>If possible, disable remote management interfaces on the D-Link DWM-222W USB Wi-Fi Adapter to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>brute-force</category><category>credential-access</category><category>network-device</category></item><item><title>Mirai Campaign Exploiting CVE-2025-29635 in D-Link Routers</title><link>https://feed.craftedsignal.io/briefs/2026-04-mirai-dlink-rce/</link><pubDate>Thu, 23 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mirai-dlink-rce/</guid><description>A new Mirai-based malware campaign is exploiting CVE-2025-29635, a command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.</description><content:encoded><![CDATA[<p>A new Mirai-based malware campaign has been observed exploiting CVE-2025-29635, a high-severity command injection vulnerability affecting D-Link DIR-823X routers. Discovered by Akamai&rsquo;s SIRT in March 2026, the campaign involves attackers sending malicious POST requests to vulnerable D-Link routers to execute arbitrary commands. This vulnerability allows attackers to download and execute a shell script, ultimately leading to the deployment of Mirai-based malware. The affected D-Link routers reached end-of-life in November 2024, meaning a patch is unlikely. The same actor is also exploiting CVE-2023-1389 impacting TP-Link routers, and an RCE flaw in ZTE ZXV10 H108L routers, deploying the same Mirai payload.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a POST request to the <code>/goform/set_prohibiting</code> endpoint on the D-Link DIR-823X router.</li>
<li>The POST request exploits CVE-2025-29635 to inject and execute arbitrary commands.</li>
<li>The injected commands change directories across writable paths on the router.</li>
<li>A shell script named <code>dlink.sh</code> is downloaded from an external IP address.</li>
<li>The <code>dlink.sh</code> script is executed on the compromised router.</li>
<li>The script installs a Mirai-based malware variant named &ldquo;tuxnokill&rdquo;.</li>
<li>&ldquo;tuxnokill&rdquo; establishes persistence and begins scanning for new targets.</li>
<li>The compromised device is then used to launch DDoS attacks, leveraging Mirai&rsquo;s standard capabilities, including TCP SYN/ACK/STOMP, UDP floods, and HTTP null attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-29635 allows attackers to remotely execute arbitrary commands on vulnerable D-Link DIR-823X routers. The compromised routers are then incorporated into the Mirai botnet, increasing its size and DDoS capabilities. Given that these routers are end-of-life, many remain unpatched, potentially leading to a large number of compromised devices. This can result in network disruptions and service outages for targeted entities, as well as potential data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for POST requests to the <code>/goform/set_prohibiting</code> endpoint on D-Link routers, as described in the Attack Chain, to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Mirai dlink.sh Download</code> to identify attempts to download the malicious shell script.</li>
<li>If using affected D-Link DIR-823X routers, TP-Link, or ZTE ZXV10 H108L routers, upgrade to a supported device or implement network segmentation to limit potential damage.</li>
<li>Block the external IP address hosting the <code>dlink.sh</code> script if it can be reliably determined and is observed on your network.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>mirai</category><category>ddos</category><category>rce</category><category>iot</category></item><item><title>D-Link DIR-825 Buffer Overflow Vulnerability in miniupnpd</title><link>https://feed.craftedsignal.io/briefs/2024-01-dlink-dir825-buffer-overflow/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dlink-dir825-buffer-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-7069) exists in the AddPortMapping function of the miniupnpd component within D-Link DIR-825 routers (up to version 3.00b32), potentially enabling attackers on the local network to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7069, has been discovered in D-Link DIR-825 routers with firmware versions up to 3.00b32. The vulnerability resides within the <code>AddPortMapping</code> function of the <code>upnpsoap.c</code> file, part of the <code>miniupnpd</code> component. An attacker on the local network can exploit this vulnerability by manipulating the <code>NewPortMappingDescription</code> argument, leading to a buffer overflow. Given that the exploit is publicly available, the risk of exploitation is elevated. This vulnerability is especially critical as it affects end-of-life products, meaning that official patches are unlikely to be released.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the local network, either through physical access or compromising a device on the network.</li>
<li>The attacker identifies a vulnerable D-Link DIR-825 router running a firmware version up to 3.00b32.</li>
<li>The attacker crafts a malicious SOAP request targeting the UPnP service on the router.</li>
<li>The crafted request includes a <code>NewPortMappingDescription</code> argument with a payload exceeding the buffer&rsquo;s capacity in the <code>AddPortMapping</code> function within <code>upnpsoap.c</code>.</li>
<li>The router&rsquo;s <code>miniupnpd</code> component processes the SOAP request, triggering the buffer overflow when writing the overly long <code>NewPortMappingDescription</code>.</li>
<li>The buffer overflow overwrites adjacent memory locations, potentially including critical function pointers or return addresses.</li>
<li>The attacker redirects execution flow to malicious code injected into the overflowed buffer.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control of the device or using it as a pivot point to attack other devices on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7069 allows an attacker on the local network to execute arbitrary code on the vulnerable D-Link DIR-825 router. This can lead to complete compromise of the router, allowing the attacker to eavesdrop on network traffic, modify DNS settings, or use the router to launch attacks against other devices within the network or on the internet. Given the end-of-life status of the affected devices, a large number of potentially vulnerable routers may remain in use, making this a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Disable UPnP on D-Link DIR-825 routers where possible to prevent exploitation of CVE-2026-7069.</li>
<li>Monitor network traffic for suspicious SOAP requests targeting the UPnP service (miniupnpd) on internal network devices using a network intrusion detection system (NIDS). Deploy the Sigma rule targeting HTTP POST requests to the UPnP service.</li>
<li>Segment networks to limit the impact of a compromised router in case of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>cve</category><category>miniupnpd</category><category>d-link</category></item></channel></rss>