INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 3h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 13h Global vulnerability Information Technology / Cybersecurity CRITICAL 15h Global malware Energy and Utilities CRITICAL 16h Global ransomware Multiple sectors CRITICAL 16h Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 3h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 13h Global vulnerability Information Technology / Cybersecurity CRITICAL 15h Global malware Energy and Utilities CRITICAL 16h Global ransomware Multiple sectors CRITICAL 16h Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 3h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 13h Global vulnerability Information Technology / Cybersecurity CRITICAL 15h Global malware Energy and Utilities CRITICAL 16h Global ransomware Multiple sectors CRITICAL 16h
Vulnerabilities

CVE-2016-20017

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
D-Link DSL-2750B Devices Command Injection Vulnerability — D-Link DSL-2750B devices contain a command injection vulnerability that allows remote, unauthenticated command injection via the login.cgi cl
Published: Jan 8, 2024  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

D-Link DSL-2750B Devices Command Injection Vulnerability — D-Link DSL-2750B devices contain a command injection vulnerability that allows remote, unauthenticated command injection via the login.cgi cli parameter.

🤖 AI Executive Summary

CVE-2016-20017 is a critical command injection vulnerability in D-Link DSL-2750B devices that allows remote, unauthenticated attackers to execute arbitrary commands via the login.cgi cli parameter. With a CVSS score of 9.0 and publicly available exploits, this vulnerability has been actively exploited in the wild. The vulnerability is particularly dangerous as it requires no authentication and can be exploited remotely, giving attackers full control over the affected device. Organizations using these legacy D-Link DSL devices should take immediate action to mitigate the risk.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 5, 2026 08:33
🇸🇦 Saudi Arabia Impact Assessment
D-Link DSL-2750B routers are commonly deployed in small-to-medium businesses and residential environments across Saudi Arabia, particularly by telecom providers (STC, Mobily, Zain) as customer premises equipment. Government sector offices, small banking branches, and healthcare clinics using legacy DSL infrastructure are at significant risk. Compromised devices can serve as entry points into internal networks, be recruited into botnets (Mirai variants have targeted this vulnerability), or be used for lateral movement. The energy sector and ARAMCO contractor networks using legacy networking equipment may also be affected. Saudi telecom operators providing these devices to customers bear responsibility for ensuring firmware updates or device replacements are deployed.
🏢 Affected Saudi Sectors
Telecommunications Government Banking Healthcare Energy Small and Medium Enterprises Education
⚖️ Saudi Risk Score (AI)
8.5
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Identify all D-Link DSL-2750B devices in your network using asset discovery scans
2. Restrict remote management access — disable WAN-side management interface immediately
3. Place affected devices behind a firewall and block external access to port 80/443 on these devices
4. Implement network segmentation to isolate affected devices

Patching Guidance:
5. Apply the latest firmware update from D-Link's support page for DSL-2750B
6. If the device has reached end-of-life (EOL), replace it with a supported device immediately
7. D-Link has discontinued support for many legacy devices — verify support status

Compensating Controls:
8. Deploy IDS/IPS rules to detect command injection attempts targeting login.cgi
9. Monitor for unusual outbound connections from DSL devices (botnet C2 traffic)
10. Implement web application firewall rules blocking malicious cli parameter values

Detection Rules:
- Alert on HTTP requests to login.cgi containing shell metacharacters (;, |, &&, backticks) in the cli parameter
- Monitor for unexpected process spawning on network devices
- Watch for Mirai-like scanning activity targeting port 80 on DSL devices
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة D-Link DSL-2750B في شبكتك باستخدام فحوصات اكتشاف الأصول
2. تقييد الوصول للإدارة عن بُعد — تعطيل واجهة الإدارة من جانب WAN فوراً
3. وضع الأجهزة المتأثرة خلف جدار حماية وحظر الوصول الخارجي للمنفذ 80/443
4. تطبيق تجزئة الشبكة لعزل الأجهزة المتأثرة

إرشادات التصحيح:
5. تطبيق آخر تحديث للبرنامج الثابت من صفحة دعم D-Link لجهاز DSL-2750B
6. إذا وصل الجهاز إلى نهاية عمره الافتراضي، استبدله بجهاز مدعوم فوراً
7. أوقفت D-Link دعم العديد من الأجهزة القديمة — تحقق من حالة الدعم

الضوابط التعويضية:
8. نشر قواعد IDS/IPS للكشف عن محاولات حقن الأوامر التي تستهدف login.cgi
9. مراقبة الاتصالات الصادرة غير العادية من أجهزة DSL (حركة مرور C2 لشبكات البوت)
10. تطبيق قواعد جدار حماية تطبيقات الويب لحظر قيم معامل cli الضارة

قواعد الكشف:
- التنبيه على طلبات HTTP إلى login.cgi التي تحتوي على أحرف shell خاصة في معامل cli
- مراقبة إنشاء العمليات غير المتوقعة على أجهزة الشبكة
- مراقبة نشاط المسح المشابه لـ Mirai الذي يستهدف المنفذ 80
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
2-3-1 (Asset Management) 2-5-1 (Network Security) 2-7-1 (Vulnerability Management) 2-9-1 (Cybersecurity Incident Management)
🔵 SAMA CSF
3.3.3 (Network Security Management) 3.3.5 (Vulnerability Management) 3.3.7 (Patch Management) 3.1.1 (Cybersecurity Risk Management)
🟡 ISO 27001:2022
A.8.9 (Configuration Management) A.8.8 (Management of Technical Vulnerabilities) A.8.20 (Networks Security) A.8.21 (Security of Network Services)
🟣 PCI DSS v4.0
6.3.3 (Patching Security Vulnerabilities) 11.3 (External and Internal Vulnerability Scans) 1.3 (Network Access Controls)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
D-Link:DSL-2750B Devices
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS93.41%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2024-01-29
Published 2024-01-08
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
8.5
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.