Description
A vulnerability was found in D-Link DIR-605L 2.13B01. This vulnerability affects the function formAdvNetwork of the file /goform/formAdvNetwork of the component POST Request Handler. Performing a manipulation of the argument curTime results in buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-04-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stack‑based buffer overflow in the formAdvNetwork function of the POST Request Handler in D‑Link DIR‑605L firmware 2.13B01. The overflow is triggered by manipulating the curTime argument in an HTTP POST request to /goform/formAdvNetwork. Because the buffer overflow occurs in privileged firmware code, an attacker can achieve remote code execution on the device. The weakness corresponds to CWE‑119 and CWE‑120, which describe buffer overflows that can lead to arbitrary code execution.

Affected Systems

Affected hardware is the D‑Link DIR‑605L wireless router running firmware version 2.13B01. Only units that are no longer supported by the manufacturer are impacted, as newer firmware releases have presumably addressed the issue.

Risk and Exploitability

The CVSS v3.1 score is 8.7, indicating high severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, but public proof‑of‑concept exploits have been released. The attack could be carried out remotely over the network by submitting a crafted POST request; therefore, the risk is significant for devices exposed to the internet or untrusted networks, and timely remediation is essential.

Generated by OpenCVE AI on April 9, 2026 at 22:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update for D‑Link DIR‑605L if available.
  • Restrict HTTP POST access to the device to trusted IPs via firewall or ACL.
  • Block the /goform/formAdvNetwork endpoint using a firewall or reverse proxy rule.
  • Monitor device logs for suspicious POST requests.

Generated by OpenCVE AI on April 9, 2026 at 22:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-605l
Dlink dir-605l Firmware
CPEs cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-605l
Dlink dir-605l Firmware

Fri, 10 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-605l
Vendors & Products D-link
D-link dir-605l

Thu, 09 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DIR-605L 2.13B01. This vulnerability affects the function formAdvNetwork of the file /goform/formAdvNetwork of the component POST Request Handler. Performing a manipulation of the argument curTime results in buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-605L POST Request formAdvNetwork buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-605l
Dlink Dir-605l Dir-605l Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T13:56:49.891Z

Reserved: 2026-04-09T12:18:27.069Z

Link: CVE-2026-5982

cve-icon Vulnrichment

Updated: 2026-04-10T13:56:45.699Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T22:16:37.467

Modified: 2026-04-30T15:24:59.820

Link: CVE-2026-5982

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:28:00Z

Weaknesses