Description
A vulnerability has been found in D-Link DIR-605L 2.13B01. This affects the function formAdvFirewall of the file /goform/formAdvFirewall of the component POST Request Handler. Such manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-04-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a classic buffer overflow triggered by manipulating the curTime parameter in the POST request to the /goform/formAdvFirewall endpoint. This overflow can be exploited remotely to gain arbitrary code execution on the affected device, compromising confidentiality, integrity, and availability of the network. The issue is categorized under CWE‑119 and CWE‑120.

Affected Systems

Devices affected are only the D‑Link DIR‑605L routers running firmware version 2.13B01. No other vendors or products are listed and the issue is limited to models that are no longer supported by the maintainer.

Risk and Exploitability

The CVSS score of 8.7 classifies the vulnerability as high severity, and the lack of an EPSS score or KEV listing indicates that it has not yet been widely exploited in known attacks, but the exploit is publicly disclosed and can be used remotely. Attackers do not need local access; a remote attacker can trigger the overflow by sending a specially crafted POST request to the formAdvFirewall handler and potentially achieve arbitrary code execution if successful.

Generated by OpenCVE AI on April 9, 2026 at 22:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the D‑Link website or relevant download portals for any firmware update that addresses the buffer overflow in the formAdvFirewall handler. If a patch is unavailable, isolate the router from untrusted networks by applying firewall rules or network segmentation. Consider disabling the advanced firewall configuration interface or limiting HTTP access to the router only from trusted internal IP ranges. Monitor router logs for unusual POST requests to the /goform/formAdvFirewall endpoint and block offending traffic if detected.

Generated by OpenCVE AI on April 9, 2026 at 22:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-605l
Dlink dir-605l Firmware
CPEs cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-605l
Dlink dir-605l Firmware

Mon, 13 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-605l
Vendors & Products D-link
D-link dir-605l

Thu, 09 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in D-Link DIR-605L 2.13B01. This affects the function formAdvFirewall of the file /goform/formAdvFirewall of the component POST Request Handler. Such manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-605L POST Request formAdvFirewall buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-605l
Dlink Dir-605l Dir-605l Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T20:37:56.459Z

Reserved: 2026-04-09T12:18:23.955Z

Link: CVE-2026-5981

cve-icon Vulnrichment

Updated: 2026-04-13T20:37:52.593Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T22:16:37.233

Modified: 2026-04-30T15:32:37.357

Link: CVE-2026-5981

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:29:01Z

Weaknesses