CVE DATABASE / CVE-2015-1187
CVE-2015-1187
D-Link and TRENDnet Multiple Devices Remote Code Execution Vulnerability
CVSS 9.8 · CRITICAL
⚠ CISA KEV — ACTIVELY EXPLOITED
On the CISA KEV catalog
Confirmed exploited in the wild. Added 2022-03-25.
Federal remediation due 2022-04-15.
Required action: The impacted product is end-of-life and should be disconnected if still in use.
Summary
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.
CVSS 3.1 breakdown
| Base score | 9.8 (CRITICAL) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Attack vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity | HIGH |
| Availability | HIGH |
Weakness type (CWE)
Affected products
Dlink dir-626l firmwareDlink dir-626lDlink dir-636l firmwareDlink dir-636lDlink dir-808l firmwareDlink dir-808lDlink dir-810l firmwareDlink dir-810lDlink dir-820l firmwareDlink dir-820lDlink dir-826l firmwareDlink dir-826lDlink dir-830l firmwareDlink dir-830lDlink dir-836l firmwareDlink dir-836lTrendnet tew-731br firmwareTrendnet tew-731brDlink dir-651 firmwareDlink dir-651
Check this CVE live
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- http://packetstormsecurity.com/files/130607/D-Link-DIR636L-Remote-Command-Injection.html
- http://packetstormsecurity.com/files/131465/D-Link-TRENDnet-NCC-Service-Command-Injection.html
- http://seclists.org/fulldisclosure/2015/Mar/15
- http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10052
- http://www.securityfocus.com/bid/72848
- https://github.com/darkarnium/secpub/tree/master/Multivendor/ncc2
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-1187
Data: NIST NVD + CISA KEV. NVD last modified 2026-04-21. Always verify against the vendor advisory before acting.