| शीर्षक | Dlink DIR-615 v4.10 OS Command Injection |
|---|
| विवरण | D-Link DIR-615 routers (hardware revision D) with firmware version 4.10 contain a command injection vulnerability in the Web configuration interface. The vulnerability exists within the "Static Routing" settings (adv_routing.php).
When an authenticated user creates or modifies a static route, the network parameters (specifically Destination IP, Subnet Mask, and Gateway IP) are saved to the device's configuration database without adequate sanitization. The backend script route_run.php, which is triggered to update the system's routing table, retrieves these values and interpolates them directly into a route shell command. An attacker with administrative access can exploit this by injecting arbitrary shell commands (using shell metacharacters like ;, &&, or |) into any of these IP address fields. These commands are executed by the system with root privileges when the routing rules are applied. |
|---|
| स्रोत | ⚠️ https://pentagonal-time-3a7.notion.site/DIR-615-routing-command-injection-2f6e5dd4c5a580089587f5e78a1bbf70?pvs=74 |
|---|
| उपयोगकर्ता | Anonymous User |
|---|
| सबमिशन | 28/01/2026 08:22 AM (3 महीनों पहले) |
|---|
| संयम | 07/02/2026 08:59 AM (10 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 344854 [D-Link DIR-615 4.10 Web Configuration Interface adv_routing.php dest_ip/ submask/ gw अधिकार वृद्धि] |
|---|
| अंक | 17 |
|---|