जमा करें #748031: Dlink DIR-615 v4.10 OS Command Injectionजानकारी

शीर्षकDlink DIR-615 v4.10 OS Command Injection
विवरणD-Link DIR-615 routers (hardware revision D) with firmware version 4.10 contain a command injection vulnerability in the Web configuration interface. The vulnerability exists within the "Advanced Firewall" settings (adv_firewall.php), specifically in the DMZ Host feature. When an authenticated user enables the DMZ Host and submits a configuration, the IP address parameter (dmz_ipaddr) is saved to the device's specialized NVRAM (XMLDB). The backend script flush_dmz.php, which is responsible for applying the new firewall rules, retrieves this value and interpolates it directly into a shell command to configure iptables without proper sanitization or validation. An attacker with administrative access can modify the HTTP request to inject arbitrary shell commands (e.g., via shell metacharacters like ;, &&, or |) into the dmz_ipaddr field. These commands are subsequently executed by the system with root privileges.
स्रोत⚠️ https://pentagonal-time-3a7.notion.site/DIR-615-OS-Command-Injection-2f6e5dd4c5a58053b2b4f166c2a503ba
उपयोगकर्ता
 Anonymous User
सबमिशन28/01/2026 08:02 AM (3 महीनों पहले)
संयम07/02/2026 08:59 AM (10 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि344853 [D-Link DIR-615 4.10 DMZ Host Feature adv_firewall.php dmz_ipaddr  अधिकार वृद्धि]
अंक17

Do you want to use VulDB in your project?

Use the official API to access entries easily!