Impact
A vulnerability was found in D-Link DIR-615 firmware 4.10 that allows OS command injection through the set_temp_nodes.php component of the URL Filter. The flaw enables an attacker to execute arbitrary system commands, effectively granting full remote code execution on the device. This weakness is categorized under CWE-77 (OS Command Injection) and CWE-78 (OS Command Injection).
Affected Systems
The affected product is the D-Link DIR-615 router running firmware version 4.10. No other versions or vendors are listed. The device is no longer supported by the maintainer, so no official patches are available.
Risk and Exploitability
The vulnerability has a high CVSS score of 8.6. The EPSS score is less than 1%, indicating a low probability of widespread exploitation, and it is not listed in the CISA KEV catalog. However, the attack can be carried out remotely by delivering a crafted request to /set_temp_nodes.php, and public exploits are available. The risk assessment remains high due to the critical impact of remote code execution and the lack of vendor support.
OpenCVE Enrichment