⚠ Actively exploited
Added to CISA KEV on 2022-03-25. Federal agencies required to patch by 2022-04-15. Required action: The impacted product is end-of-life and should be disconnected if still in use..
CVE-2015-1187
Severity
9.8CRITICAL
EPSS
81.2%
top 0.83%
CISA KEV
KEV
Added 2022-03-25
Due 2022-04-15
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedSep 21
KEV addedMar 25
KEV dueApr 15
Latest updateNov 8
CISA Required Action: The impacted product is end-of-life and should be disconnected if still in use.
Description
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages13 packages
🔴Vulnerability Details
3GHSA▶
GHSA-2cvq-m957-r86c: The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping↗2022-05-17
CVEList▶
CVE-2015-1187: The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping↗2017-09-21
💥Exploits & PoCs
1🔍Detection Rules
1Suricata
▶