CVE-2013-10059
D-Link Routers tools_vct.htm OS Command Injection
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
An authenticated OS command injection vulnerability exists in various D-Link routers (tested on DIR-615H1 running firmware version 8.04) via the tools_vct.htm endpoint. The web interface fails to sanitize input passed from the ping_ipaddr parameter to the tools_vct.htm diagnostic interface, allowing attackers to inject arbitrary shell commands using backtick encapsulation. With default credentials, an attacker can exploit this blind injection vector to execute arbitrary commands.
| CWE | CWE-78 |
| Vendor | d-link |
| Product | dir-615h1 |
| Published | Aug 1, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for d-link dir-615h1
Be the first to know when new unknown vulnerabilities affecting d-link dir-615h1 are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
D-Link / DIR-615H1
* ≤ 8.04
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir615_up_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/24477 exploit-db.com: https://www.exploit-db.com/exploits/25609 web.archive.org: https://web.archive.org/web/20150921102603/http://www.s3cur1ty.de/m1adv2013-008 vulncheck.com: https://www.vulncheck.com/advisories/d-link-legacy-os-command-injection
Credits
Michael Messner