🔐 CVE Alert

CVE-2013-10050

UNKNOWN 0.0

D-Link Devices tools_vct.xgi Unauthenticated RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An OS command injection vulnerability exists in multiple D-Link routers—confirmed on DIR-300 rev A (v1.05) and DIR-615 rev D (v4.13)—via the authenticated tools_vct.xgi CGI endpoint. The web interface fails to properly sanitize user-supplied input in the pingIp parameter, allowing attackers with valid credentials to inject arbitrary shell commands. Exploitation enables full device compromise, including spawning a telnet daemon and establishing a root shell. The vulnerability is present in firmware versions that expose tools_vct.xgi and use the Mathopd/1.5p6 web server. No vendor patch is available, and affected models are end-of-life.

CWE CWE-78
Vendor d-link
Product dir-300 rev a
Published Aug 1, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for d-link dir-300 rev a

Be the first to know when new unknown vulnerabilities affecting d-link dir-300 rev a are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

D-Link / DIR-300 rev A
* ≤ 1.05
D-Link / DIR-615 rev D
* ≤ 4.13

References

NVD ↗ CVE.org ↗ EPSS Data ↗
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb exploit-db.com: https://www.exploit-db.com/exploits/25024 exploit-db.com: https://www.exploit-db.com/exploits/27428 web.archive.org: https://web.archive.org/web/20140830203110/http://www.s3cur1ty.de/m1adv2013-014 vulncheck.com: https://www.vulncheck.com/advisories/d-link-legacy-unauth-rce-2 exploit-db.com: https://www.exploit-db.com/raw/25024

Credits

Michael Messner