Description
A vulnerability was detected in D-Link DIR-615 up to 4.10. This impacts an unknown function of the file /wiz_policy_3_machine.php of the component Web Management Interface. Performing a manipulation of the argument ipaddr results in os command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-01-26
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The flaw is an OS command injection vulnerability in the D‑Link DIR‑615 web management interface. By manipulating the ipaddr parameter in the file wiz_policy_3_machine.php, an attacker can inject shell commands that are executed on the underlying operating system. This grants the attacker remote code execution, compromising the device’s confidentiality, integrity, and availability.

Affected Systems

The vulnerability affects D‑Link DIR‑615 routers running firmware up to version 4.10. The insecure functionality resides in the Web Management Interface component and applies to devices that are no longer supported by the vendor.

Risk and Exploitability

The CVSS score is 8.6, indicating high severity, while the EPSS score is less than 1%, implying a low chance of widespread exploitation today. The exploit is publicly documented and can be carried out remotely over the network, so exposed management interfaces are at significant risk. The vulnerability is not included in the CISA KEV catalog, but the public nature of the exploit and support status increase its potential impact.

Generated by OpenCVE AI on April 18, 2026 at 02:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device to the latest firmware from D‑Link that fixes the command‑injection issue.
  • Limit access to the Web Management Interface to trusted IP addresses or restrict it to a local network by configuring firewall rules.
  • If a firmware update is unavailable, block or disable the wiz_policy_3_machine.php endpoint or prevent manipulation of the ipaddr parameter through access controls.

Generated by OpenCVE AI on April 18, 2026 at 02:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 28 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-615
Dlink dir-615 Firmware
CPEs cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-615_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-615
Dlink dir-615 Firmware

Tue, 27 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-615
Vendors & Products D-link
D-link dir-615

Mon, 26 Jan 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in D-Link DIR-615 up to 4.10. This impacts an unknown function of the file /wiz_policy_3_machine.php of the component Web Management Interface. Performing a manipulation of the argument ipaddr results in os command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-615 Web Management wiz_policy_3_machine.php os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-615
Dlink Dir-615 Dir-615 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:59:03.345Z

Reserved: 2026-01-26T17:34:30.346Z

Link: CVE-2026-1448

cve-icon Vulnrichment

Updated: 2026-01-27T21:28:50.436Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-27T00:15:50.573

Modified: 2026-01-28T16:37:25.937

Link: CVE-2026-1448

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:45:27Z

Weaknesses