Impact
The vulnerability is a stack‑based buffer overflow in the formAdvNetwork function of the POST Request Handler in D‑Link DIR‑605L firmware 2.13B01. The overflow is triggered by manipulating the curTime argument in an HTTP POST request to /goform/formAdvNetwork. Because the buffer overflow occurs in privileged firmware code, an attacker can achieve remote code execution on the device. The weakness corresponds to CWE‑119 and CWE‑120, which describe buffer overflows that can lead to arbitrary code execution.
Affected Systems
Affected hardware is the D‑Link DIR‑605L wireless router running firmware version 2.13B01. Only units that are no longer supported by the manufacturer are impacted, as newer firmware releases have presumably addressed the issue.
Risk and Exploitability
The CVSS v3.1 score is 8.7, indicating high severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, but public proof‑of‑concept exploits have been released. The attack could be carried out remotely over the network by submitting a crafted POST request; therefore, the risk is significant for devices exposed to the internet or untrusted networks, and timely remediation is essential.
OpenCVE Enrichment