Impact
The flaw is a command injection vulnerability located in the adv_routing.php file of the Web Configuration Interface. By sending crafted values to destination IP, subnet mask, or gateway parameters, an attacker can cause the router to execute arbitrary operating‑system commands. This allows complete compromise of the device, giving the attacker control over the router’s settings and potentially enabling further network attacks. The weakness corresponds to the common CWE-77/78 categories.
Affected Systems
The vulnerability affects D‑Link DIR‑615 routers running firmware version 4.10. The firmware is no longer supported by the vendor, and only the listed router model is known to be impacted.
Risk and Exploitability
The CVSS score of 8.6 indicates a high severity. With an EPSS probability of 3 percent, the potential for exploitation is moderate to high in environments where the router is reachable from the Internet. Based on the description, it is inferred that the flaw can be triggered remotely via the web interface; however, the CVE description does not specify whether authentication is required, so the exact privilege requirement remains uncertain. The vulnerability is not present in the CISA KEV catalog, but the public availability of an exploit increases real‑world risk.
OpenCVE Enrichment