An authenticated OS command injection vulnerability exists in various D-Link routers (tested on DIR-615H1 running firmware version 8.04) via the tools_vct.htm endpoint. The web interface fails to sanitize input passed from the ping_ipaddr parameter to the tools_vct.htm diagnostic interface, allowing attackers to inject arbitrary shell commands using backtick encapsulation. With default credentials, an attacker can exploit this blind injection vector to execute arbitrary commands.
References
Configurations
Configuration 1 (hide)
AND |
|
History
23 Sep 2025, 19:10
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:dlink:dir-615h_firmware:*:*:*:*:*:*:*:* |
23 Sep 2025, 17:11
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
CPE | cpe:2.3:h:dlink:dir-615h:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-615h_firmware:8.04:*:*:*:*:*:*:* |
|
First Time |
Dlink dir-615h
Dlink Dlink dir-615h Firmware |
|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir615_up_exec.rb - Exploit | |
References | () https://web.archive.org/web/20150921102603/http://www.s3cur1ty.de/m1adv2013-008 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/24477 - Exploit | |
References | () https://www.exploit-db.com/exploits/25609 - Exploit | |
References | () https://www.vulncheck.com/advisories/d-link-legacy-os-command-injection - Third Party Advisory |
04 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://www.exploit-db.com/exploits/24477 - |
01 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-01 21:15
Updated : 2025-09-23 19:10
NVD link : CVE-2013-10059
Mitre link : CVE-2013-10059
CVE.ORG link : CVE-2013-10059
JSON object : View
Products Affected
dlink
- dir-615h_firmware
- dir-615h
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')