Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1505: OS Command Injection in D-Link DIR-615

0
High
VulnerabilityCVE-2026-1505cvecve-2026-1505
Published: Wed Jan 28 2026 (01/28/2026, 01:32:08 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-615

Description

CVE-2026-1505 is a high-severity OS command injection vulnerability affecting the D-Link DIR-615 router running firmware version 4. 10. The flaw exists in the URL Filter component, specifically in the /set_temp_nodes. php file, allowing remote attackers to execute arbitrary OS commands without user interaction or authentication. Although the product is no longer supported by the vendor, the exploit code has been publicly disclosed, increasing the risk of exploitation. This vulnerability can lead to full compromise of the affected device, impacting confidentiality, integrity, and availability. European organizations using this legacy hardware in their networks are at risk, especially those with exposed or poorly segmented devices. Mitigation options are limited due to lack of vendor patches, so network-level controls and device replacement are recommended. Countries with higher D-Link market penetration and critical infrastructure relying on such devices are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/28/2026, 02:20:15 UTC

Technical Analysis

CVE-2026-1505 is an OS command injection vulnerability identified in the D-Link DIR-615 router firmware version 4.10. The vulnerability is located in the URL Filter component, specifically in the processing of the /set_temp_nodes.php endpoint. An attacker can remotely send specially crafted requests to this endpoint to inject arbitrary operating system commands, which the device executes with elevated privileges. The vulnerability does not require authentication or user interaction, making it highly exploitable over the network. The CVSS 4.0 score of 8.6 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although the device is no longer supported and no official patches are available, the public disclosure of exploit code increases the risk of exploitation by threat actors. Successful exploitation could allow attackers to take full control of the router, manipulate network traffic, intercept sensitive data, or launch further attacks within the network. The vulnerability affects only version 4.10 of the firmware and is specific to the DIR-615 model, which is widely deployed in home and small office environments but may still be present in some enterprise edge networks or IoT setups.

Potential Impact

For European organizations, this vulnerability poses a significant risk if legacy D-Link DIR-615 routers running firmware 4.10 remain in use, especially in network perimeters or critical segments. Exploitation can lead to full device compromise, enabling attackers to intercept or redirect traffic, deploy malware, or pivot to internal networks. This threatens confidentiality through data interception, integrity by altering network configurations or traffic, and availability by causing device crashes or denial of service. The lack of vendor support means no official patches are available, increasing exposure. Organizations relying on these devices for VPN termination, firewalling, or routing could face operational disruptions and data breaches. The risk is heightened in environments with poor network segmentation or exposed management interfaces. Additionally, the public availability of exploit code lowers the barrier for attackers, including cybercriminals and state-sponsored actors targeting European infrastructure.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should prioritize immediate replacement of affected D-Link DIR-615 devices with supported hardware running updated firmware. Until replacement is feasible, network-level mitigations should be implemented: restrict access to the router's management interfaces by applying strict firewall rules limiting inbound traffic to trusted IPs; disable or restrict URL Filter features if possible; monitor network traffic for unusual requests targeting /set_temp_nodes.php; deploy intrusion detection/prevention systems (IDS/IPS) with signatures for this exploit; segment legacy devices on isolated VLANs to limit lateral movement; enforce strong network segmentation and access controls; conduct regular network scans to identify vulnerable devices; and educate staff about risks of legacy hardware. Organizations should also review their asset inventories to identify any remaining DIR-615 devices and plan for their decommissioning. Finally, consider deploying network anomaly detection tools to detect exploitation attempts in real time.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-27T20:08:44.039Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69796f044623b1157c5b85f2

Added to database: 1/28/2026, 2:05:56 AM

Last enriched: 1/28/2026, 2:20:15 AM

Last updated: 1/28/2026, 3:13:23 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats