Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link dir-513 |
|
| Vendors & Products |
D-link
D-link dir-513 |
Fri, 20 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in D-Link DIR-513 1.10. This affects the function formEasySetPassword of the file /goform/formEasySetPassword of the component Web Service. The manipulation of the argument curTime results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. | |
| Title | D-Link DIR-513 Web Service formEasySetPassword stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-20T14:35:33.407Z
Reserved: 2026-03-20T08:18:38.288Z
Link: CVE-2026-4486
Updated: 2026-03-20T14:35:30.583Z
Status : Received
Published: 2026-03-20T14:16:16.907
Modified: 2026-03-20T14:16:16.907
Link: CVE-2026-4486
No data.
OpenCVE Enrichment
Updated: 2026-03-20T16:27:13Z