🔐 CVE Alert

CVE-2013-10059

UNKNOWN 0.0

D-Link Routers tools_vct.htm OS Command Injection

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An authenticated OS command injection vulnerability exists in various D-Link routers (tested on DIR-615H1 running firmware version 8.04) via the tools_vct.htm endpoint. The web interface fails to sanitize input passed from the ping_ipaddr parameter to the tools_vct.htm diagnostic interface, allowing attackers to inject arbitrary shell commands using backtick encapsulation. With default credentials, an attacker can exploit this blind injection vector to execute arbitrary commands.

CWE CWE-78
Vendor d-link
Product dir-615h1
Published Aug 1, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for d-link dir-615h1

Be the first to know when new unknown vulnerabilities affecting d-link dir-615h1 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

D-Link / DIR-615H1
* ≤ 8.04

References

NVD ↗ CVE.org ↗ EPSS Data ↗
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir615_up_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/24477 exploit-db.com: https://www.exploit-db.com/exploits/25609 web.archive.org: https://web.archive.org/web/20150921102603/http://www.s3cur1ty.de/m1adv2013-008 vulncheck.com: https://www.vulncheck.com/advisories/d-link-legacy-os-command-injection

Credits

Michael Messner