CVE-2026-1506
- EPSS 0.1%
- Veröffentlicht 28.01.2026 02:32:09
- Zuletzt bearbeitet 30.01.2026 21:46:35
A vulnerability was determined in D-Link DIR-615 4.10. Impacted is an unknown function of the file /adv_mac_filter.php of the component MAC Filter Configuration. This manipulation of the argument mac causes os command injection. The attack is possibl...
CVE-2026-1505
- EPSS 0.31%
- Veröffentlicht 28.01.2026 01:32:08
- Zuletzt bearbeitet 30.01.2026 21:47:30
A vulnerability was found in D-Link DIR-615 4.10. This issue affects some unknown processing of the file /set_temp_nodes.php of the component URL Filter. The manipulation results in os command injection. The attack can be executed remotely. The explo...
CVE-2026-1448
- EPSS 0.36%
- Veröffentlicht 26.01.2026 23:32:08
- Zuletzt bearbeitet 28.01.2026 16:37:25
A vulnerability was detected in D-Link DIR-615 up to 4.10. This impacts an unknown function of the file /wiz_policy_3_machine.php of the component Web Management Interface. Performing a manipulation of the argument ipaddr results in os command inject...
CVE-2018-25115
- EPSS 1.64%
- Veröffentlicht 27.08.2025 21:24:23
- Zuletzt bearbeitet 24.09.2025 18:03:34
Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system comman...
CVE-2013-10050
- EPSS 61.92%
- Veröffentlicht 01.08.2025 20:39:00
- Zuletzt bearbeitet 23.09.2025 17:38:12
An OS command injection vulnerability exists in multiple D-Link routers—confirmed on DIR-300 rev A (v1.05) and DIR-615 rev D (v4.13)—via the authenticated tools_vct.xgi CGI endpoint. The web interface fails to properly sanitize user-supplied input in...
CVE-2024-0717
- EPSS 28.39%
- Veröffentlicht 19.01.2024 16:15:11
- Zuletzt bearbeitet 21.11.2024 08:47:12
A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, D...
CVE-2021-42627
- EPSS 61.19%
- Veröffentlicht 23.08.2022 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:27:52
The WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of p...
CVE-2021-40654
- EPSS 0.83%
- Veröffentlicht 24.09.2021 21:15:07
- Zuletzt bearbeitet 21.11.2024 06:24:31
An information disclosure issue exist in D-LINK-DIR-615 B2 2.01mt. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page
CVE-2021-37388
- EPSS 3.43%
- Veröffentlicht 06.08.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 06:15:03
A buffer overflow in D-Link DIR-615 C2 3.03WW. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker to crash the webserver and might even gain remote code execution.
CVE-2019-17525
- EPSS 16.2%
- Veröffentlicht 21.04.2020 19:15:12
- Zuletzt bearbeitet 21.11.2024 04:32:26
The login page on D-Link DIR-615 T1 20.10 devices allows remote attackers to bypass the CAPTCHA protection mechanism and conduct brute-force attacks.