CVE-2026-1705

2.4 LOW

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in D-Link DSL-6641K routers. Attackers can inject malicious scripts via the Name parameter in the ad_virtual_server_vdsl function of the web interface, potentially compromising users who access the router's admin panel. The vulnerability affects devices running firmware version N8.TR069.20131126.

💻 Affected Systems

Products:
  • D-Link DSL-6641K
Versions: N8.TR069.20131126
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web management interface component. Any device with this firmware version is vulnerable if the web interface is accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator credentials, hijack router sessions, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to full router compromise.

🟠

Likely Case

Attackers could steal session cookies or credentials from users who access the vulnerable web interface, enabling unauthorized access to router settings.

🟢

If Mitigated

With proper network segmentation and access controls limiting router admin interface exposure, impact would be minimal as only authorized internal users could be targeted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to trick an authenticated user into visiting a malicious link or page. The vulnerability is in the web interface, so exploitation is straightforward once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.dlink.com/

Restart Required: No

Instructions:

Check D-Link's official website for firmware updates. If available, download the latest firmware for DSL-6641K and apply it through the router's web interface under System Tools > Firmware Upgrade.

🔧 Temporary Workarounds

Restrict Web Interface Access

all

Limit access to the router's web management interface to trusted internal networks only.

Disable Remote Management

all

Turn off remote management features to prevent external access to the web interface.

🧯 If You Can't Patch

  • Segment the router management network from user networks
  • Implement strict firewall rules to block external access to router management ports (typically 80/443)

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface: Login > Status > Device Info. If version is N8.TR069.20131126, the device is vulnerable.

Check Version:

No CLI command available. Must use web interface: http://router-ip/status/deviceinfo

Verify Fix Applied:

After updating firmware, verify the version no longer shows N8.TR069.20131126. Test the vulnerable endpoint with safe payloads to confirm XSS is mitigated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /cgi-bin/ad_virtual_server_vdsl with suspicious Name parameter values
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • External IP addresses accessing router management ports
  • Unusual traffic patterns to/from router management interface

SIEM Query:

source="router_logs" AND (uri="/cgi-bin/ad_virtual_server_vdsl" AND (param="Name" AND value CONTAINS "<script>" OR value CONTAINS "javascript:"))

🔗 References

📤 Share & Export