Impact
A stack‑based buffer overflow resides in the formSetEmail function of the D‑Link DIR‑513 firmware 1.10. By sending a crafted curTime value to the /goform/formSetEmail web endpoint, an attacker can corrupt the stack and potentially execute arbitrary code on the device. The vulnerability is explicitly described as exploitable remotely and a public exploit exists.
Affected Systems
Only D‑Link DIR‑513 units running firmware version 1.10 are affected; no other models or firmware releases are listed. These devices are no longer supported by the vendor, implying that they rely on legacy firmware with no official patch available.
Risk and Exploitability
The CVSS base score of 8.7 classifies the flaw as high severity. An EPSS score below 1% indicates that exploitation attempts are currently infrequent, likely due to limited usage or exposure of the vulnerable firmware. The vulnerability is not listed in the CISA KEV catalog, suggesting no known active exploitation campaigns. Attackers can exploit the weakness by delivering a malicious HTTP request to the exposed web management interface without additional prerequisites.
OpenCVE Enrichment