CVE-2026-1625
📋 TL;DR
This CVE describes a command injection vulnerability in D-Link DWR-M961 routers that allows remote attackers to execute arbitrary commands on affected devices. The vulnerability exists in the SMS message management component and can be exploited without authentication. Organizations using DWR-M961 routers with vulnerable firmware are affected.
💻 Affected Systems
- D-Link DWR-M961
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the router allowing attackers to establish persistent access, intercept network traffic, pivot to internal networks, and potentially brick the device.
Likely Case
Attackers gain shell access to the router, enabling them to modify configurations, install malware, or use the device as part of a botnet.
If Mitigated
With proper network segmentation and access controls, impact is limited to the router itself without lateral movement to other systems.
🎯 Exploit Status
Public exploit details are available on GitHub, making exploitation straightforward for attackers with basic skills.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.dlink.com/
Restart Required: Yes
Instructions:
1. Check D-Link website for firmware updates
2. Download latest firmware if available
3. Upload via router admin interface
4. Reboot router after update
🔧 Temporary Workarounds
Disable SMS Management Interface
allDisable the vulnerable SMS management component if not needed
Network Segmentation
allIsolate router management interface from untrusted networks
🧯 If You Can't Patch
- Remove internet-facing access to router management interface
- Implement strict firewall rules to limit access to router from trusted IPs only
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via admin interface. If version is 1.1.47, device is vulnerable.
Check Version:
Check via router web interface at System > Firmware or via SSH if enabled
Verify Fix Applied:
Verify firmware version has been updated to a version later than 1.1.47
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /boafrm/formSmsManage
- Suspicious command execution in system logs
- Unexpected configuration changes
Network Indicators:
- Unusual outbound connections from router
- Traffic to known malicious IPs
- Port scanning originating from router
SIEM Query:
source="router_logs" AND (uri="/boafrm/formSmsManage" OR command="*sh*" OR command="*bash*")