Authenticated OS Command Injection in D‑Link DIR‑615H1 via tools_vct.htm ping_ipaddr Parameter

Post Reply
Shane1145
Posts: 1624
Joined: Wed Sep 25, 2024 2:31 pm

Authenticated OS Command Injection in D‑Link DIR‑615H1 via tools_vct.htm ping_ipaddr Parameter

Post by Shane1145 »

An authenticated OS command injection vulnerability exists in various D-Link routers (tested on DIR-615H1 running firmware version 8.04) via the tools_vct.htm endpoint. The web interface fails to sanitize input passed from the ping_ipaddr parameter to the tools_vct.htm diagnostic interface, allowing attackers to inject arbitrary shell commands using backtick encapsulation. With default credentials, an attacker can exploit this blind injection vector to execute arbitrary commands.

https://www.tenable.com/cve/CVE-2013-10059
Post Reply