An OS command injection vulnerability exists in multiple D-Link routers—confirmed on DIR-300 rev A (v1.05) and DIR-615 rev D (v4.13)—via the authenticated tools_vct.xgi CGI endpoint. The web interface fails to properly sanitize user-supplied input in the pingIp parameter, allowing attackers with valid credentials to inject arbitrary shell commands. Exploitation enables full device compromise, including spawning a telnet daemon and establishing a root shell. The vulnerability is present in firmware versions that expose tools_vct.xgi and use the Mathopd/1.5p6 web server. No vendor patch is available, and affected models are end-of-life.
References
Link | Resource |
---|---|
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb | Exploit |
https://web.archive.org/web/20140830203110/http://www.s3cur1ty.de/m1adv2013-014 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/25024 | Exploit |
https://www.exploit-db.com/exploits/27428 | Exploit |
https://www.vulncheck.com/advisories/d-link-legacy-unauth-rce-2 | Third Party Advisory |
https://www.exploit-db.com/raw/25024 | Exploit |
Configurations
History
23 Sep 2025, 17:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb - Exploit | |
References | () https://web.archive.org/web/20140830203110/http://www.s3cur1ty.de/m1adv2013-014 - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/25024 - Exploit | |
References | () https://www.exploit-db.com/exploits/27428 - Exploit | |
References | () https://www.vulncheck.com/advisories/d-link-legacy-unauth-rce-2 - Third Party Advisory | |
References | () https://www.exploit-db.com/raw/25024 - Exploit | |
CPE | cpe:2.3:o:dlink:dir-300_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-615_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-300:a:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-615:d:*:*:*:*:*:*:* |
|
First Time |
Dlink dir-615 Firmware
Dlink dir-615 Dlink dir-300 Firmware Dlink Dlink dir-300 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
04 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
01 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-01 21:15
Updated : 2025-09-23 17:38
NVD link : CVE-2013-10050
Mitre link : CVE-2013-10050
CVE.ORG link : CVE-2013-10050
JSON object : View
Products Affected
dlink
- dir-615_firmware
- dir-300
- dir-300_firmware
- dir-615
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')