Critical severity9.8CISA KEVNVD Advisory· Published Sep 21, 2017· Updated Apr 21, 2026
CVE-2015-1187
CVE-2015-1187
Description
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.
Affected products
18- cpe:2.3:o:dlink:dir-626l_firmware:1.04:b04:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-636l_firmware:1.04:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-651_firmware:1.10na:b02:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-808l_firmware:1.03:b05:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-810l_firmware:1.01:b04:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:dlink:dir-810l_firmware:1.01:b04:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-810l_firmware:2.02:b01:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-820l_firmware:1.02:b10:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:dlink:dir-820l_firmware:1.02:b10:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-820l_firmware:1.05:b03:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-820l_firmware:2.01:b02:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-826l_firmware:1.00:b23:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-830l_firmware:1.00:b07:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-836l_firmware:1.01:b03:*:*:*:*:*:*
- cpe:2.3:o:trendnet:tew-651br_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:trendnet:tew-652br_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:trendnet:tew-711br_firmware:1.00:b31:*:*:*:*:*:*
- cpe:2.3:o:trendnet:tew-731br_firmware:2.01:b01:*:*:*:*:*:*
- cpe:2.3:o:trendnet:tew-810dr_firmware:1.00:b19:*:*:*:*:*:*
- cpe:2.3:o:trendnet:tew-813dru_firmware:1.00:b23:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- packetstormsecurity.com/files/131465/D-Link-TRENDnet-NCC-Service-Command-Injection.htmlnvdExploitThird Party AdvisoryVDB Entry
- packetstormsecurity.com/files/130607/D-Link-DIR636L-Remote-Command-Injection.htmlnvdIssue TrackingThird Party AdvisoryVDB Entry
- seclists.org/fulldisclosure/2015/Mar/15nvdIssue TrackingMailing ListThird Party Advisory
- securityadvisories.dlink.com/security/publication.aspxnvdVendor Advisory
- www.securityfocus.com/bid/72848nvdBroken LinkThird Party AdvisoryVDB Entry
- github.com/darkarnium/secpub/tree/master/Multivendor/ncc2nvdBroken LinkIssue TrackingMitigationThird Party Advisory
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
News mentions
0No linked articles in our index yet.