Description
A vulnerability was found in D-Link DIR-615 4.10. This issue affects some unknown processing of the file /set_temp_nodes.php of the component URL Filter. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-01-28
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via OS Command Injection
Action: Replace Device
AI Analysis

Impact

A vulnerability was found in D-Link DIR-615 firmware 4.10 that allows OS command injection through the set_temp_nodes.php component of the URL Filter. The flaw enables an attacker to execute arbitrary system commands, effectively granting full remote code execution on the device. This weakness is categorized under CWE-77 (OS Command Injection) and CWE-78 (OS Command Injection).

Affected Systems

The affected product is the D-Link DIR-615 router running firmware version 4.10. No other versions or vendors are listed. The device is no longer supported by the maintainer, so no official patches are available.

Risk and Exploitability

The vulnerability has a high CVSS score of 8.6. The EPSS score is less than 1%, indicating a low probability of widespread exploitation, and it is not listed in the CISA KEV catalog. However, the attack can be carried out remotely by delivering a crafted request to /set_temp_nodes.php, and public exploits are available. The risk assessment remains high due to the critical impact of remote code execution and the lack of vendor support.

Generated by OpenCVE AI on April 18, 2026 at 01:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Disable or block access to the URL Filter component or the set_temp_nodes.php endpoint using firewall or router rules.
  • Place the router on a segregated network segment and restrict inbound internet traffic to limit exposure.
  • If an updated firmware that removes the weakness becomes available, upgrade to that firmware; otherwise, replace the router with a supported, secure model.

Generated by OpenCVE AI on April 18, 2026 at 01:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-615
Dlink dir-615 Firmware
CPEs cpe:2.3:h:dlink:dir-615:d:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-615_firmware:4.10:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-615
Dlink dir-615 Firmware

Wed, 28 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-615
Vendors & Products D-link
D-link dir-615

Wed, 28 Jan 2026 02:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DIR-615 4.10. This issue affects some unknown processing of the file /set_temp_nodes.php of the component URL Filter. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-615 URL Filter set_temp_nodes.php os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-615
Dlink Dir-615 Dir-615 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:59:34.094Z

Reserved: 2026-01-27T20:08:44.039Z

Link: CVE-2026-1505

cve-icon Vulnrichment

Updated: 2026-01-28T14:45:15.294Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T02:16:00.083

Modified: 2026-01-30T21:47:30.330

Link: CVE-2026-1505

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:00:10Z

Weaknesses