An authenticated OS command injection vulnerability exists in various D-Link routers (tested on DIR-615H1 running firmware version 8.04) via the tools_vct.htm endpoint. The web interface fails to sanitize input passed from the ping_ipaddr parameter to the tools_vct.htm diagnostic interface, allowing attackers to inject arbitrary shell commands using backtick encapsulation. With default credentials, an attacker can exploit this blind injection vector to execute arbitrary commands.
CVSS
No CVSS.
References
Configurations
No configuration.
History
04 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/24477 - | |
Summary |
|
01 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-01 21:15
Updated : 2025-08-04 15:15
NVD link : CVE-2013-10059
Mitre link : CVE-2013-10059
CVE.ORG link : CVE-2013-10059
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')