• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10445
DIR-615: B2/C1\C2\D1\D2\D3\D4\D5\E1\E3\E4\E5\F1\F2\F3\G1\G2\H1\H2\I1\I2\I3\J1\K1\K2\M1\M2\N1\O1\P1\Q1\Q2\R1\S1\T1\T2\T3\U1\V1\W1\X1 Hardware Revisions / All Firmware Versions : End-of-Life (EoL) / End-of-Service (EoS) : Vulnerabiliites Reported
Publication ID: SAP10445
Resolved Status: Yes
Published on: 4 August 2025 8:16 GMT
Last updated on: 3 February 2026 6:34 GMT

Overview  

 

The DIR-615, B2 \ C1 \ C2 \ D1 \ D2 \ D3 \ D4 \ D5 \ E1 \ E3 \ E4 \ E5 \ F1 \ F2 \ F3 \ G1 \ G2 \ H1 \ H2 \ I1 \ I2 \ I3 \ J1 \ K1 \ K2 \ M1 \ M2 \ N1 \ O1 \ P1 \ Q1 \ Q2 \ R1 \ S1 \ T1 \ T2 \ T3 \ U1 \ V1 \ W1 \ X1 hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle.  D-Link US recommends that D-Link devices that have reached EOL/EOS be retired and replaced. Please get in touch with your regional office for recommendations (LINK). 

 

As a general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products ceases.  Please read the information and recommendations below.
 

Report information

 

CVE-2013-10050 : Link : DIR-615 rev D firmware v4.13 An OS command injection vulnerability via the authenticated tools_vct.xgi CGI endpoint. The web interface fails to properly sanitize user-supplied input in the pingIp parameter, allowing attackers with valid credentials to inject arbitrary shell commands. Exploitation enables full device compromise, including spawning a telnet daemon and establishing a root shell.

 

CVE-2013-10059 : Link : DIR-615 rev H1 firmware v8.04)An OS command injection vulnerability via the tools_vct.htm endpoint. The web interface fails to sanitize input passed from the ping_ipaddr parameter to the tools_vct.htm diagnostic interface, allowing attackers to inject arbitrary shell commands using backtick encapsulation.

 

CVE-2018-25115 : LinkMultiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise.

 

CVE-2026-1448 : Link : A vulnerability was detected in D-Link DIR-615 up to 4.10. This impacts an unknown function of the file /wiz_policy_3_machine.php of the component Web Management Interface. Performing a manipulation of the argument ipaddr results in os command injection.


CVE-2026-1505 : Link : A vulnerability was found in D-Link DIR-615 4.10. This issue affects some unknown processing of the file /set_temp_nodes.php of the component URL Filter. The manipulation results in os command injection. 

 

CVE-2026-1506 : Link : A vulnerability was determined in D-Link DIR-615 4.10. Impacted is an unknown function of the file /adv_mac_filter.php of the component MAC Filter Configuration. This manipulation of the argument mac causes os command injection.

 

 

Affected Models

 

Model

Region

Hardware Revision

End of Support

Legacy Website

Last Updated

DIR-615

Worldwide

All B2 \ C1 \ C2 \ D1 \ D2 \ D3 \ D4 \ D5 \ E1 \ E3 \ E4 \ E5 \ F1 \ F2 \ F3 \ G1 \ G2 \ H1 \ H2 \ I1 \ I2 \ I3 \ J1 \ K1 \ K2 \ M1 \ M2 \ N1 \ O1 \ P1 \ Q1 \ Q2 \ R1 \ S1 \ T1 \ T2 \ T3 \ U1 \ V1 \ W1 \ X1 H/W Revisions

04/30/2024

For US Available Models (Link)

02/03/2026

 

 

Recommendation for End of Support /End of Life Products

  
From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to the evolution of technology, market demands, new innovations, product efficiencies based on the latest technologies, or the product's maturity over time, which necessitates replacement with functionally superior technology.

 

For US Consumer

   
If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is usually no further extended support or development for it.

 

Typically for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased. 

 

D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please ensure the device has the most recent firmware, update its unique password frequently to access its web-configuration, and always enable WIFI encryption with a unique password.