PT-2025-31687 · D Link · D-Link Dir-615+1

Published

2012-10-15

·

Updated

2025-08-01

·

CVE-2013-10050

CVSS v2.0

9.0

High

AV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions D-Link DIR-300 version 1.05 D-Link DIR-615 version 4.13
Description An OS command injection vulnerability exists in multiple D-Link routers via the authenticated tools vct.xgi CGI endpoint. The web interface does not properly sanitize user-supplied input in the pingIp parameter, allowing attackers with valid credentials to inject arbitrary shell commands. Successful exploitation can lead to full device compromise, including the ability to spawn a telnet daemon and establish a root shell. The vulnerability is present in firmware versions that expose tools vct.xgi and use the Mathopd/1.5p6 web server.
Recommendations D-Link DIR-300 version 1.05: At the moment, there is no information about a newer version that contains a fix for this vulnerability. D-Link DIR-615 version 4.13: At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

OS Command Injection

Weakness Enumeration

Related Identifiers

BDU:2025-09523
CVE-2013-10050

Affected Products

D-Link Dir-300
D-Link Dir-615