CVE-2026-1744
📋 TL;DR
This CVE describes a cross-site scripting (XSS) vulnerability in D-Link DSL-6641K routers running firmware version N8.TR069.20131126. Attackers can inject malicious scripts via the Username parameter in the PPPoE configuration interface, potentially compromising router administration sessions. Only unsupported legacy devices are affected.
💻 Affected Systems
- D-Link DSL-6641K
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains administrative control of router, modifies network settings, intercepts traffic, or installs persistent malware on the device.
Likely Case
Session hijacking of admin interface, credential theft, or defacement of router configuration pages.
If Mitigated
Limited to temporary session compromise if proper network segmentation and admin interface restrictions are in place.
🎯 Exploit Status
Exploit requires access to admin interface. Public technical details available but no automated exploit tools confirmed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: None
Vendor Advisory: https://www.dlink.com/
Restart Required: No
Instructions:
No official patch available. Product is end-of-life. Replace with supported hardware.
🔧 Temporary Workarounds
Disable remote administration
allPrevent external access to router web interface
Access router admin > Security > Remote Management > Disable
Change default credentials
allUse strong unique admin password
Access router admin > Management > Change Password
🧯 If You Can't Patch
- Replace affected routers with supported models
- Segment network to isolate vulnerable devices behind firewall
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface: System > Firmware
Check Version:
Not applicable - check via web interface
Verify Fix Applied:
Verify router model and firmware version no longer matches affected version
📡 Detection & Monitoring
Log Indicators:
- Unusual admin login attempts
- PPPoE configuration changes with script-like usernames
Network Indicators:
- HTTP requests to sp_pppoe_user.js with script tags in parameters
SIEM Query:
http.url:*sp_pppoe_user* AND (http.param:*<script>* OR http.param:*javascript:*)
🔗 References
- https://tzh00203.notion.site/D-Link-DSL6641K-version-N8-TR069-20131126-XSS-via-sp_pppoe_user-js-Configuration-2eeb5c52018a80d083aaf19efbaa9130?source=copy_link
- https://vuldb.com/?ctiid.343675
- https://vuldb.com/?id.343675
- https://vuldb.com/?submit.742439
- https://www.dlink.com/
- https://tzh00203.notion.site/D-Link-DSL6641K-version-N8-TR069-20131126-XSS-via-sp_pppoe_user-js-Configuration-2eeb5c52018a80d083aaf19efbaa9130?source=copy_link