A vulnerability was detected in D-Link DIR-615 up to 4.10. This impacts an unknown function of the file /wiz_policy_3_machine.php of the component Web Management Interface. Performing a manipulation of the argument ipaddr results in os command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
| Link | Resource |
|---|---|
| https://pentagonal-time-3a7.notion.site/DIR-615-v4-10-2e7e5dd4c5a580a5aac5c8ce35933396?pvs=73 | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.342880 | Permissions Required VDB Entry |
| https://vuldb.com/?id.342880 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.737006 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-27 00:15
Updated : 2026-01-28 16:37
NVD link : CVE-2026-1448
Mitre link : CVE-2026-1448
CVE.ORG link : CVE-2026-1448
JSON object : View
Products Affected
dlink
- dir-615_firmware
- dir-615
