A vulnerability was found in D-Link DIR-615 4.10. This issue affects some unknown processing of the file /set_temp_nodes.php of the component URL Filter. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
| Link | Resource |
|---|---|
| https://pentagonal-time-3a7.notion.site/D-Link-DIR-615-2e7e5dd4c5a580109a14fdeb6f105cd6 | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.343117 | Permissions Required VDB Entry |
| https://vuldb.com/?id.343117 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.737061 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-28 02:16
Updated : 2026-01-30 21:47
NVD link : CVE-2026-1505
Mitre link : CVE-2026-1505
CVE.ORG link : CVE-2026-1505
JSON object : View
Products Affected
dlink
- dir-615_firmware
- dir-615
