D-Link Dsl 2640t

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in D-Link Dsl 2640t.

By the Year

In 2026 there have been 1 vulnerability in D-Link Dsl 2640t.

Year Vulnerabilities Average Score
2026 1 0.00

It may take a day or so for new Dsl 2640t vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent D-Link Dsl 2640t Security Vulnerabilities

D-Link dnscfg.cgi Auth Bypass in DSL/DIR/DNS Router
CVE-2026-0625 - January 05, 2026

Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality. By directly requesting this endpoint, an attacker can modify the devices DNS settings without valid credentials, enabling DNS hijacking (DNSChanger) attacks that redirect user traffic to attacker-controlled infrastructure. In 2019, D-Link reported that this behavior was leveraged by the "GhostDNS" malware ecosystem targeting consumer and carrier routers. All impacted products were subsequently designated end-of-life/end-of-service, and no longer receive security updates. Exploitation evidence was observed by the Shadowserver Foundation on 2025-11-27 (UTC).

Missing Authentication for Critical Function

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for D-Link Dsl 2640t or by D-Link? Click the Watch button to subscribe.

 

D-Link
Vendor

 
subscribe