Impact
The vulnerability is a classic buffer overflow triggered by manipulating the curTime parameter in the POST request to the /goform/formAdvFirewall endpoint. This overflow can be exploited remotely to gain arbitrary code execution on the affected device, compromising confidentiality, integrity, and availability of the network. The issue is categorized under CWE‑119 and CWE‑120.
Affected Systems
Devices affected are only the D‑Link DIR‑605L routers running firmware version 2.13B01. No other vendors or products are listed and the issue is limited to models that are no longer supported by the maintainer.
Risk and Exploitability
The CVSS score of 8.7 classifies the vulnerability as high severity, and the lack of an EPSS score or KEV listing indicates that it has not yet been widely exploited in known attacks, but the exploit is publicly disclosed and can be used remotely. Attackers do not need local access; a remote attacker can trigger the overflow by sending a specially crafted POST request to the formAdvFirewall handler and potentially achieve arbitrary code execution if successful.
OpenCVE Enrichment