Description
A vulnerability has been found in D-Link DIR-615 4.10. This affects an unknown part of the file adv_firewall.php of the component DMZ Host Feature. Such manipulation of the argument dmz_ipaddr  leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-02-08
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS Command Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the adv_firewall.php component of the DMZ Host Feature on D-Link DIR-615 routers running firmware 4.10. A malformed dmz_ipaddr parameter allows an attacker to inject arbitrary operating system commands that execute in the context of the web server. This flaw provides remote execution privilege; an attacker could take full control of the device, modify configuration, intercept traffic, or launch further attacks against the network.

Affected Systems

The issue affects D-Link DIR-615 routers running firmware version 4.10. Devices are no longer supported by the vendor, so they remain vulnerable until a patch or newer firmware is applied.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity vulnerability. The EPSS score of less than 1 % signifies that exploitation is currently considered low probability, but the vulnerability is publicly disclosed and can be leveraged remotely without authentication. Even though the device is unsupported, the lack of an authorised firmware update increases the risk of exploitation. The vulnerability is not listed in the CISA KEV catalog, but its remote nature and command injection potential warrant urgent attention.

Generated by OpenCVE AI on April 17, 2026 at 21:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to a version that removes the vulnerable code or apply an official patch if one becomes available.
  • Disable the DMZ host feature, or block access to the adv_firewall.php endpoint, to eliminate the injection surface.
  • Configure network segmentation and access controls to prevent unauthenticated external parties from reaching the router’s administrative interfaces—e.g., limit HTTP access to the LAN and/or use firewall ACLs to block incoming management traffic.

Generated by OpenCVE AI on April 17, 2026 at 21:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-615
Dlink dir-615 Firmware
CPEs cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-615_firmware:4.10:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-615
Dlink dir-615 Firmware

Tue, 10 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-615
Vendors & Products D-link
D-link dir-615

Sun, 08 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in D-Link DIR-615 4.10. This affects an unknown part of the file adv_firewall.php of the component DMZ Host Feature. Such manipulation of the argument dmz_ipaddr  leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-615 DMZ Host Feature adv_firewall.php os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-615
Dlink Dir-615 Dir-615 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:41:37.291Z

Reserved: 2026-02-07T07:59:08.539Z

Link: CVE-2026-2151

cve-icon Vulnrichment

Updated: 2026-02-10T19:57:35.882Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T12:15:52.813

Modified: 2026-02-11T18:45:45.703

Link: CVE-2026-2151

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:00:11Z

Weaknesses