Impact
The vulnerability appears in the ad_virtual_server_vdsl function of the web interface on D-Link DSL‑6641K routers. By manipulating the Name parameter, an attacker can inject arbitrary script into the browser of any user who accesses the page. This remote cross‑site scripting can lead to session hijacking, defacement, or the execution of malicious code, exploiting weaknesses identified as CWE‑79 and CWE‑94.
Affected Systems
Affected systems are D-Link DSL‑6641K routers running firmware version N8.TR069.20131126. No other product versions are specified, so only this build is known to be vulnerable.
Risk and Exploitability
The CVSS base score is 4.8, indicating low severity, and the EPSS score is less than 1 %, suggesting a low probability of exploitation. The vulnerability is triggerable entirely from the web interface, meaning it can be exploited remotely by sending crafted HTTP requests to the ad_virtual_server_vdsl endpoint. The exploit is publicly available and may be used by attackers with minimal technical skill. The vulnerability is not listed in the KEV catalog.
OpenCVE Enrichment