⚠ Actively exploited
Added to CISA KEV on 2022-02-10. Federal agencies required to patch by 2022-08-10. Required action: The impacted product is end-of-life and should be disconnected if still in use..
CVE-2015-2051
Severity
9.8CRITICAL
EPSS
93.0%
top 0.22%
CISA KEV
KEV
Added 2022-02-10
Due 2022-08-10
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedFeb 23
KEV addedFeb 10
KEV dueAug 10
Latest updateDec 29
CISA Required Action: The impacted product is end-of-life and should be disconnected if still in use.
Description
The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages1 packages
🔴Vulnerability Details
3💥Exploits & PoCs
1🔍Detection Rules
1Suricata▶
ET EXPLOIT D-Link HNAP SOAPAction Command Injection (CVE-2015-2051, CVE-2019-10891, CVE-2022,37056, CVE-2024-33112, CVE-2025-11488, CVE-2025-63932)↗2021-11-17