⚠ Actively exploited
Added to CISA KEV on 2022-03-25. Federal agencies required to patch by 2022-04-15. Required action: The impacted product is end-of-life and should be disconnected if still in use..

CVE-2015-1187

Severity
9.8CRITICAL
EPSS
81.2%
top 0.83%
CISA KEV
KEV
Added 2022-03-25
Due 2022-04-15
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedSep 21
KEV addedMar 25
KEV dueApr 15
Latest updateNov 8
CISA Required Action: The impacted product is end-of-life and should be disconnected if still in use.

Description

The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages13 packages

🔴Vulnerability Details

3
GHSA
GHSA-2cvq-m957-r86c: The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping2022-05-17
CVEList
CVE-2015-1187: The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping2017-09-21
VulnCheck
D-Link and TRENDnet Multiple Devices Remote Code Execution Vulnerability2015

💥Exploits & PoCs

1
Exploit-DB
D-Link/TRENDnet - NCC Service Command Injection (Metasploit)2015-02-26

🔍Detection Rules

1
Suricata
ET EXPLOIT D-Link TRENDnet NCC Service Command Injection Attempt (CVE-2015-1187)2023-11-08

📋Vendor Advisories

1
CISA
D-Link and TRENDnet Multiple Devices Remote Code Execution Vulnerability2022-03-25
CVE-2015-1187 (CRITICAL CVSS 9.8) | The ping tool in multiple D-Link an | cvebase.io