CVE-2013-10059

An authenticated OS command injection vulnerability exists in various D-Link routers (tested on DIR-615H1 running firmware version 8.04) via the tools_vct.htm endpoint. The web interface fails to sanitize input passed from the ping_ipaddr parameter to the tools_vct.htm diagnostic interface, allowing attackers to inject arbitrary shell commands using backtick encapsulation. With default credentials, an attacker can exploit this blind injection vector to execute arbitrary commands.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-615h_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-615h:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-08-01 21:15

Updated : 2025-09-23 19:10


NVD link : CVE-2013-10059

Mitre link : CVE-2013-10059

CVE.ORG link : CVE-2013-10059


JSON object : View

Products Affected

dlink

  • dir-615h_firmware
  • dir-615h
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')