Description
A vulnerability was found in D-Link DIR-615 4.10. This vulnerability affects unknown code of the file adv_routing.php of the component Web Configuration Interface. Performing a manipulation of the argument dest_ip/ submask/ gw results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-02-08
Score: 8.6 High
EPSS: 3.1% Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The flaw is a command injection vulnerability located in the adv_routing.php file of the Web Configuration Interface. By sending crafted values to destination IP, subnet mask, or gateway parameters, an attacker can cause the router to execute arbitrary operating‑system commands. This allows complete compromise of the device, giving the attacker control over the router’s settings and potentially enabling further network attacks. The weakness corresponds to the common CWE-77/78 categories.

Affected Systems

The vulnerability affects D‑Link DIR‑615 routers running firmware version 4.10. The firmware is no longer supported by the vendor, and only the listed router model is known to be impacted.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity. With an EPSS probability of 3 percent, the potential for exploitation is moderate to high in environments where the router is reachable from the Internet. Based on the description, it is inferred that the flaw can be triggered remotely via the web interface; however, the CVE description does not specify whether authentication is required, so the exact privilege requirement remains uncertain. The vulnerability is not present in the CISA KEV catalog, but the public availability of an exploit increases real‑world risk.

Generated by OpenCVE AI on April 18, 2026 at 13:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to a version that fixes the command injection in adv_routing.php.
  • Restrict access to the Web Configuration Interface, disabling or blocking the adv_routing.php endpoint for remote users.
  • Implement network segmentation or a firewall rule that limits external devices from reaching the router’s management interface.

Generated by OpenCVE AI on April 18, 2026 at 13:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-615
Dlink dir-615 Firmware
CPEs cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-615_firmware:4.10:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-615
Dlink dir-615 Firmware

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-615
Vendors & Products D-link
D-link dir-615

Sun, 08 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DIR-615 4.10. This vulnerability affects unknown code of the file adv_routing.php of the component Web Configuration Interface. Performing a manipulation of the argument dest_ip/ submask/ gw results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-615 Web Configuration adv_routing.php os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-615
Dlink Dir-615 Dir-615 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:41:53.959Z

Reserved: 2026-02-07T07:59:12.442Z

Link: CVE-2026-2152

cve-icon Vulnrichment

Updated: 2026-02-10T19:58:35.520Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T13:16:03.507

Modified: 2026-02-11T18:45:20.223

Link: CVE-2026-2152

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:30:45Z

Weaknesses