Vulnerabilities (CVE)

Filtered by vendor Dlink Subscribe
Filtered by product Dir-610 Firmware
Total 3 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-25115 1 Dlink 14 Dir-110, Dir-110 Firmware, Dir-412 and 11 more 2025-09-24 N/A 9.8 CRITICAL
Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-08-21 UTC.
CVE-2020-9377 1 Dlink 2 Dir-610, Dir-610 Firmware 2025-03-14 6.5 MEDIUM 8.8 HIGH
D-Link DIR-610 devices allow Remote Command Execution via the cmd parameter to command.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2020-9376 1 Dlink 2 Dir-610, Dir-610 Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1 to getcfg.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer