PT-2025-31687 · D Link · D-Link Dir-615 +1

Published

2012-10-15

·

Updated

2025-08-01

·

CVE-2013-10050

CVSS v2.0
9.0
VectorAV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions D-Link DIR-300 version 1.05 D-Link DIR-615 version 4.13
Description An OS command injection vulnerability exists in multiple D-Link routers via the authenticated
tools vct.xgi
CGI endpoint. The web interface does not properly sanitize user-supplied input in the
pingIp
parameter, allowing attackers with valid credentials to inject arbitrary shell commands. Successful exploitation can lead to full device compromise, including the ability to spawn a telnet daemon and establish a root shell. The vulnerability is present in firmware versions that expose
tools vct.xgi
and use the Mathopd/1.5p6 web server.
Recommendations D-Link DIR-300 version 1.05: At the moment, there is no information about a newer version that contains a fix for this vulnerability. D-Link DIR-615 version 4.13: At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

OS Command Injection

Weakness Enumeration

Related Identifiers

BDU:2025-09523
CVE-2013-10050

Affected Products

D-Link Dir-300
D-Link Dir-615