CVE-2026-2152

7.2 HIGH

Published 2026-02-08 · Modified 2026-02-09 · Awaiting Analysis

Quick Summary

A critical vulnerability in the D-Link DIR-615 router allows remote attackers to execute commands on the device by sending specially crafted data to its web configuration page. This is a serious flaw because it lets attackers take full control of the router from the internet.

Who is affected

This affects users of the D-Link DIR-615 4.10 router. An attacker could change settings, steal information, or use the compromised router to attack other devices on the network.

Recommended fix

Since the product is no longer supported, no official patch is available. The only secure remediation is to immediately replace the router with a currently supported model. If replacement is not possible, isolate the router from the internet and disable its remote administration feature.

Technical Description

A vulnerability was found in D-Link DIR-615 4.10. This vulnerability affects unknown code of the file adv_routing.php of the component Web Configuration Interface. Performing a manipulation of the argument dest_ip/ submask/ gw results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS Details

Attack Vector

NETWORK

Complexity

LOW

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CWE

CWE-78, CWE-77

References