Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2152: OS Command Injection in D-Link DIR-615

0
High
VulnerabilityCVE-2026-2152cvecve-2026-2152
Published: Sun Feb 08 2026 (02/08/2026, 12:32:09 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-615

Description

CVE-2026-2152 is a high-severity OS command injection vulnerability affecting the D-Link DIR-615 router running firmware version 4. 10. The flaw exists in the web configuration interface, specifically in the adv_routing. php file, where manipulation of parameters such as dest_ip, submask, or gw can lead to remote command execution. This vulnerability can be exploited without user interaction or authentication, making it highly dangerous. Although the affected product is no longer supported by D-Link, public exploits are available, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability of affected devices. European organizations using this outdated router model are at risk, especially in countries with higher market penetration of D-Link devices or critical infrastructure relying on such routers. Mitigation options are limited due to lack of official patches, so network segmentation, device replacement, and strict access controls are recommended.

AI-Powered Analysis

AILast updated: 02/08/2026, 13:00:37 UTC

Technical Analysis

CVE-2026-2152 is an OS command injection vulnerability identified in the D-Link DIR-615 router firmware version 4.10. The vulnerability resides in the adv_routing.php component of the web configuration interface, where improper sanitization of user-supplied parameters—dest_ip, submask, and gw—allows an attacker to inject arbitrary operating system commands. This flaw can be exploited remotely over the network without requiring authentication or user interaction, significantly increasing the attack surface. The vulnerability enables an attacker to execute commands with high privileges, potentially leading to full compromise of the device, interception or manipulation of network traffic, and pivoting into internal networks. Despite the severity, the affected product is no longer supported by the vendor, and no official patches have been released. Public exploit code has been made available, facilitating exploitation by malicious actors. The CVSS v4.0 score of 8.6 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation and lack of required authentication. This vulnerability is particularly concerning for environments where these routers remain in use, as attackers can leverage it to disrupt network operations or conduct further attacks within the network.

Potential Impact

For European organizations, the impact of CVE-2026-2152 can be significant, especially for those still operating legacy D-Link DIR-615 routers. Successful exploitation can lead to complete device compromise, allowing attackers to intercept sensitive data, disrupt network connectivity, or use the device as a foothold for lateral movement within corporate networks. This can affect confidentiality through data interception, integrity by modifying routing or configuration settings, and availability by causing device or network outages. Critical infrastructure sectors, small and medium enterprises, and organizations with limited IT resources that have not upgraded their network hardware are particularly vulnerable. The lack of vendor support and patches increases the risk of prolonged exposure. Additionally, the public availability of exploits raises the likelihood of opportunistic attacks targeting these devices across Europe.

Mitigation Recommendations

Given the absence of official patches due to end-of-life status of the DIR-615 model, European organizations should prioritize immediate replacement of affected devices with supported hardware running updated firmware. Until replacement is feasible, network administrators should isolate these routers from untrusted networks, restrict access to the web configuration interface via firewall rules or VPNs, and disable remote management features if enabled. Monitoring network traffic for anomalous activity related to the adv_routing.php interface parameters can help detect exploitation attempts. Employing network segmentation to limit the impact of compromised devices and enforcing strict access controls on management interfaces are critical. Organizations should also conduct asset inventories to identify any remaining DIR-615 devices and plan for their phased decommissioning. Finally, raising user awareness about the risks of legacy hardware and maintaining up-to-date inventories will reduce exposure to similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T07:59:12.442Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698885974b57a58fa18a8291

Added to database: 2/8/2026, 12:46:15 PM

Last enriched: 2/8/2026, 1:00:37 PM

Last updated: 2/8/2026, 2:03:36 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats