CVE-2026-2152
7.2 HIGHPublished 2026-02-08 · Modified 2026-02-09 · Awaiting Analysis
Quick Summary
A critical vulnerability in the D-Link DIR-615 router allows remote attackers to execute commands on the device by sending specially crafted data to its web configuration page. This is a serious flaw because it lets attackers take full control of the router from the internet.
Who is affected
This affects users of the D-Link DIR-615 4.10 router. An attacker could change settings, steal information, or use the compromised router to attack other devices on the network.
Recommended fix
Since the product is no longer supported, no official patch is available. The only secure remediation is to immediately replace the router with a currently supported model. If replacement is not possible, isolate the router from the internet and disable its remote administration feature.
Technical Description
A vulnerability was found in D-Link DIR-615 4.10. This vulnerability affects unknown code of the file adv_routing.php of the component Web Configuration Interface. Performing a manipulation of the argument dest_ip/ submask/ gw results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Details
Attack Vector
NETWORK
Complexity
LOW
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE
CWE-78, CWE-77