Description
A flaw has been found in D-Link DIR-513 1.10. The impacted element is an unknown function of the file /goform/formSysCmd. Executing a manipulation of the argument sysCmd can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-03-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Replace Device
AI Analysis

Impact

The vulnerability allows an attacker to execute arbitrary operating system commands by manipulating the sysCmd parameter in the /goform/formSysCmd endpoint of the D‑Link DIR‑513 firmware 1.10. This translates to remote command execution, giving the attacker full control over the device’s shell and compromising confidentiality, integrity, and availability. It is a classic OS command injection flaw covered by CWE‑77 and CWE‑78.

Affected Systems

The flaw is present on the D‑Link DIR‑513 router running firmware version 1.10, a product that is no longer supported by the vendor and therefore not receiving official updates. Devices that still use this firmware are at risk if left exposed to the internet.

Risk and Exploitability

With a CVSS score of 5.3 and an EPSS probability of less than 1 %, the vulnerability is of moderate severity and currently unlikely to be widely exploited, yet published exploits exist. Because the attack vector is remote and can be performed over the web interface, any machine with the device exposed to the internet could be compromised. No listing in the CISA KEV catalog does not negate the need for remediation.

Generated by OpenCVE AI on April 3, 2026 at 22:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace the device or upgrade to a supported model that receives security updates.
  • Limit access to the web interface by disabling remote administration or placing the device behind a VPN.
  • Use firewall rules to block or restrict the /goform/formSysCmd URI from external networks.

Generated by OpenCVE AI on April 3, 2026 at 22:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-513
Dlink dir-513 Firmware
CPEs cpe:2.3:h:dlink:dir-513:a1:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-513:a2:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-513_firmware:1.10:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-513
Dlink dir-513 Firmware

Fri, 20 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-513
Vendors & Products D-link
D-link dir-513

Fri, 20 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in D-Link DIR-513 1.10. The impacted element is an unknown function of the file /goform/formSysCmd. Executing a manipulation of the argument sysCmd can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-513 formSysCmd os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-513
Dlink Dir-513 Dir-513 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-20T14:40:38.611Z

Reserved: 2026-03-19T20:28:56.507Z

Link: CVE-2026-4465

cve-icon Vulnrichment

Updated: 2026-03-20T14:40:35.187Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T02:16:40.043

Modified: 2026-04-03T19:37:04.103

Link: CVE-2026-4465

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T08:09:04Z

Weaknesses