CVE-2026-1505

A vulnerability was found in D-Link DIR-615 4.10. This issue affects some unknown processing of the file /set_temp_nodes.php of the component URL Filter. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://pentagonal-time-3a7.notion.site/D-Link-DIR-615-2e7e5dd4c5a580109a14fdeb6f105cd6 Exploit Third Party Advisory
https://vuldb.com/?ctiid.343117 Permissions Required VDB Entry
https://vuldb.com/?id.343117 Third Party Advisory VDB Entry
https://vuldb.com/?submit.737061 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-615_firmware:4.10:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-615:d:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-28 02:16

Updated : 2026-01-30 21:47


NVD link : CVE-2026-1505

Mitre link : CVE-2026-1505

CVE.ORG link : CVE-2026-1505


JSON object : View

Products Affected

dlink

  • dir-615_firmware
  • dir-615
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')