LIVE NEWSROOM · --:-- · May 25, 2026
A LIBRARY FOR SECURITY RESEARCHERS

CVE DATABASE  /  CVE-2015-1187

CVE-2015-1187

D-Link and TRENDnet Multiple Devices Remote Code Execution Vulnerability

CVSS 9.8 · CRITICAL ⚠ CISA KEV — ACTIVELY EXPLOITED
On the CISA KEV catalog

Confirmed exploited in the wild. Added 2022-03-25. Federal remediation due 2022-04-15.
Required action: The impacted product is end-of-life and should be disconnected if still in use.

Summary

The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.

CVSS 3.1 breakdown

Base score9.8 (CRITICAL)
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack vectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
IntegrityHIGH
AvailabilityHIGH

Weakness type (CWE)

Affected products

Dlink dir-626l firmwareDlink dir-626lDlink dir-636l firmwareDlink dir-636lDlink dir-808l firmwareDlink dir-808lDlink dir-810l firmwareDlink dir-810lDlink dir-820l firmwareDlink dir-820lDlink dir-826l firmwareDlink dir-826lDlink dir-830l firmwareDlink dir-830lDlink dir-836l firmwareDlink dir-836lTrendnet tew-731br firmwareTrendnet tew-731brDlink dir-651 firmwareDlink dir-651
Check this CVE live

Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.

References

Data: NIST NVD + CISA KEV. NVD last modified 2026-04-21. Always verify against the vendor advisory before acting.

Scroll to Top