Description
A vulnerability was detected in D-Link DIR-605L 2.13B01. Affected by this vulnerability is the function formVirtualServ of the file /goform/formVirtualServ of the component POST Request Handler. The manipulation of the argument curTime results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-04-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow exists in the formVirtualServ handler of the DIR‑605L’s web interface. By sending a malicious POST request that exploits the curTime argument, an attacker can overwrite adjacent memory and trigger arbitrary code execution. The flaw is a classic buffer copy without bounds checks (CWE‑119) and buffer over‑write (CWE‑120), allowing complete control of the device.

Affected Systems

The vulnerability only affects the D‑Link DIR‑605L model running firmware 2.13B01. This generation is no longer supported by the vendor, meaning no official security updates are available for the exposed platforms.

Risk and Exploitability

The CVSS assessment of 8.7 places the issue in the high‑severity category, and documented public exploits demonstrate that the attack can be carried out remotely without authentication. While EPSS data is not provided, the confirmed exploitability and lack of vendor support significantly increase the risk of exploitation. The flaw is not listed in the CISA KEV catalog, but the combination of public exploitation and unsupported hardware makes immediate action critical.

Generated by OpenCVE AI on April 9, 2026 at 22:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check D‑Link’s support site for a firmware update that fixes the formVirtualServ buffer overflow.
  • If no update is available, restrict access to the /goform/formVirtualServ endpoint using network firewalls or web application filters to block or limit remote POST requests.
  • Monitor device logs for anomalous POST traffic and investigate any suspicious activity.

Generated by OpenCVE AI on April 9, 2026 at 22:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-605l
Dlink dir-605l Firmware
CPEs cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-605l
Dlink dir-605l Firmware

Fri, 10 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-605l
Vendors & Products D-link
D-link dir-605l

Thu, 09 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in D-Link DIR-605L 2.13B01. Affected by this vulnerability is the function formVirtualServ of the file /goform/formVirtualServ of the component POST Request Handler. The manipulation of the argument curTime results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-605L POST Request formVirtualServ buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-605l
Dlink Dir-605l Dir-605l Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T18:08:05.848Z

Reserved: 2026-04-09T12:18:05.451Z

Link: CVE-2026-5979

cve-icon Vulnrichment

Updated: 2026-04-10T18:08:02.159Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T21:16:13.967

Modified: 2026-04-30T15:34:17.683

Link: CVE-2026-5979

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:29:17Z

Weaknesses