{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1505","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-27T20:08:44.039Z","datePublished":"2026-01-28T01:32:08.889Z","dateUpdated":"2026-02-23T08:59:34.094Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:59:34.094Z"},"title":"D-Link DIR-615 URL Filter set_temp_nodes.php os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"D-Link","product":"DIR-615","versions":[{"version":"4.10","status":"affected"}],"modules":["URL Filter"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in D-Link DIR-615 4.10. This issue affects some unknown processing of the file /set_temp_nodes.php of the component URL Filter. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":7.2,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.2,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":8.3,"vectorString":"AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-27T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-29T03:24:14.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Zephyr369 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.343117","name":"VDB-343117 | D-Link DIR-615 URL Filter set_temp_nodes.php os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.343117","name":"VDB-343117 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.737061","name":"Submit #737061 | Dlink DIR-615 v4.10 OS Command Injection","tags":["third-party-advisory"]},{"url":"https://pentagonal-time-3a7.notion.site/D-Link-DIR-615-2e7e5dd4c5a580109a14fdeb6f105cd6","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-28T14:44:01.628491Z","id":"CVE-2026-1505","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-28T14:45:20.266Z"}}]}}