Description
A vulnerability was found in D-Link DIR-513 1.10. This affects the function formEasySetPassword of the file /goform/formEasySetPassword of the component Web Service. The manipulation of the argument curTime results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-03-20
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Mitigate
AI Analysis

Impact

The formEasySetPassword endpoint on the /goform interface of the D‑Link DIR‑513 router contains a stack‑based buffer overflow. An attacker can send a malformed curTime parameter in an HTTP request. If the overflow occurs, the stack can be corrupted, allowing arbitrary code execution or a denial‑of‑service on the device. A proof‑of‑concept exploit has been released publicly.

Affected Systems

Only devices with firmware 1.10 of the DIR‑513 series are vulnerable. That firmware version is no longer maintained by D‑Link and no official update is available. The affected devices run the DIR‑513 hardware in models a1 and a2.

Risk and Exploitability

The CVSS base score of 8.7 classifies the flaw as high severity. The EPSS score is below 1 % and the vulnerability is not listed in CISA’s KEV catalogue, yet the remote nature and public exploit mean that exposed routers are still at significant risk. An attacker only needs to send a crafted request to the /goform/formEasySetPassword path from outside the local network to trigger the overflow.

Generated by OpenCVE AI on April 3, 2026 at 22:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Block the /goform/formEasySetPassword URI on the router from external networks using firewall or ACL rules.
  • Disable remote web administration or restrict it to the local network only via VPN or IP filtering.
  • Replace the router with a supported model or install secure third‑party firmware that eliminates the vulnerability.

Generated by OpenCVE AI on April 3, 2026 at 22:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-513
Dlink dir-513 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:dlink:dir-513:a1:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-513:a2:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-513_firmware:1.10:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-513
Dlink dir-513 Firmware

Fri, 20 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-513
Vendors & Products D-link
D-link dir-513

Fri, 20 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DIR-513 1.10. This affects the function formEasySetPassword of the file /goform/formEasySetPassword of the component Web Service. The manipulation of the argument curTime results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-513 Web Service formEasySetPassword stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-513
Dlink Dir-513 Dir-513 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-20T14:35:33.407Z

Reserved: 2026-03-20T08:18:38.288Z

Link: CVE-2026-4486

cve-icon Vulnrichment

Updated: 2026-03-20T14:35:30.583Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T14:16:16.907

Modified: 2026-04-03T19:35:51.653

Link: CVE-2026-4486

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T08:09:03Z

Weaknesses