Impact
The vulnerability is a stack buffer overflow in the D‑Link DIR‑513 firmware version 1.10, triggered by the curTime parameter sent to the goform/formSetWizardSelectMode endpoint. As a result of the out‑of‑bounds write (CWE‑121) and related buffer over‑read/write (CWE‑787), the stack can be corrupted; the description does not explicitly state the exact outcome, but such an overflow may allow an attacker to execute arbitrary code, therefore this is an inferred potential impact.
Affected Systems
Affected devices are D‑Link DIR‑513 routers running firmware version 1.10. The common platform enumeration strings reference only this model and firmware build; no other versions are listed as vulnerable based on the available data.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity. The EPSS score of less than 1 % suggests a low probability that the flaw has already been exploited in the wild. This vulnerability is not included in the CISA KEV catalog. The information suggests the issue is reachable via the router’s web interface; it is inferred that an attacker can contact the goform/formSetWizardSelectMode endpoint remotely to trigger the overflow. The CVE description does not specify whether authentication is required, but it is inferred that administrative access may be necessary, though this is not confirmed by the provided data.
OpenCVE Enrichment