Impact
The vulnerability lies in the D-Link DIR‑513 firmware 1.10, specifically within the /goform/formEasySetupWizard3 endpoint. Manipulating the wan_connected argument triggers a stack‑based buffer overflow, which can allow an attacker to execute arbitrary code. This type of flaw is classified under CWE‑119 (Buffer Overflow) and CWE‑121 (Stack-Based Buffer Overflow). The direct effect is the compromise of confidentiality, integrity and availability of the device, potentially giving an attacker full control over the router.
Affected Systems
The affected system is the D‑Link DIR‑513 router running firmware version 1.10. The product is identified by the CPE strings "cpe:2.3:h:dlink:dir‑513:-:*:*:*:*:*:*:*" and "cpe:2.3:o:dlink:dir‑513_firmware:1.10:*:*:*:*:*:*:". Only this firmware build is listed as vulnerable.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity, and the EPSS score of less than 1% suggests a low likelihood of widespread exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, the exploit can be launched remotely via the /goform/formEasySetupWizard3 interface, implying a remote attack vector. Attackers would need network access to the router’s management interface to send a crafted WAN-connected request, leading to a stack-based buffer overflow and remote code execution.
OpenCVE Enrichment