Impact
The vulnerability is a buffer overflow in the formSetMACFilter function of the POST Request Handler on the D-Link DIR-605L router. Manipulating the curTime argument causes the buffer to overflow, allowing a remote attacker to write arbitrary data and potentially execute malicious code. The flaw is classified as CWE‑119 (buffer overflow) and CWE‑120 (partial matching). Because the exploit is published and can be triggered remotely, it threatens confidentiality, integrity, and availability of the device and any network traffic it manages.
Affected Systems
Affected devices include the D-Link DIR-605L router running firmware version 2.13B01. This firmware is no longer maintained or supported by the vendor. No other affected versions are listed in the available data.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity, and the EPSS score is not available, but the existence of a published exploit and the possibility of remote attack raise the likelihood of real‑world exploitation. The vulnerability is not listed in CISA’s KEV catalog, yet its remote nature and severity warrant immediate attention. The attack vector is through an external POST request to /goform/formSetMACFilter, which an attacker can reach over the network if the router’s administrative interface is exposed.
OpenCVE Enrichment