Description
A vulnerability was determined in D-Link DIR-615 4.10. Impacted is an unknown function of the file /adv_mac_filter.php of the component MAC Filter Configuration. This manipulation of the argument mac causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-01-28
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an OS command injection flaw (CWE-78, CWE-77) in the mac argument of the adv_mac_filter.php component of D‑Link DIR‑615 firmware 4.10. An attacker may supply crafted input to the mac parameter, which is passed directly to the operating system shell, allowing execution of arbitrary commands on the router. The flaw provides a full compromise of the device’s confidentiality, integrity and availability through remote exploitation.

Affected Systems

This issue affects D‑Link DIR‑615 routers running firmware version 4.10. No supported firmware updates are available for this version and the product is no longer maintained by the vendor. The vulnerability is specific to the MAC Filter Configuration feature and does not extend to other components of the device.

Risk and Exploitability

The CVSS score of 8.6 classifies the flaw as high severity. Although the EPSS score is reported as less than 1%, indicating a low probability of exploitation, the vulnerability has been publicly disclosed and can be triggered remotely without authentication. The flaw is not listed in the CISA KEV catalog, but its impact and remote nature elevate its risk for exposed devices. Attackers would need network access to the router’s management interface to exploit the injection point.

Generated by OpenCVE AI on April 18, 2026 at 14:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available firmware update from D‑Link that addresses the MAC Filter Configuration command injection flaw; if no update exists, upgrade to a supported router model.
  • Disable or remove the MAC Filter Configuration service or the adv_mac_filter.php script if it is not required for network operation.
  • Restrict remote access to the router’s web management interface by configuring firewall rules or enabling local‑only management access.

Generated by OpenCVE AI on April 18, 2026 at 14:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-615
Dlink dir-615 Firmware
CPEs cpe:2.3:h:dlink:dir-615:d:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-615_firmware:4.10:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-615
Dlink dir-615 Firmware

Wed, 28 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-615
Vendors & Products D-link
D-link dir-615

Wed, 28 Jan 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in D-Link DIR-615 4.10. Impacted is an unknown function of the file /adv_mac_filter.php of the component MAC Filter Configuration. This manipulation of the argument mac causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-615 MAC Filter Configuration adv_mac_filter.php os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-615
Dlink Dir-615 Dir-615 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:59:48.767Z

Reserved: 2026-01-27T20:08:47.525Z

Link: CVE-2026-1506

cve-icon Vulnrichment

Updated: 2026-01-28T14:43:22.488Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T03:15:50.367

Modified: 2026-01-30T21:46:35.937

Link: CVE-2026-1506

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:45:03Z

Weaknesses