Description
A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetDDNS of the file /goform/formSetDDNS of the component POST Request Handler. Executing a manipulation of the argument curTime can lead to buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-04-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Replace Device
AI Analysis

Impact

The vulnerability exists in the formSetDDNS endpoint of the D‑Link DIR‑605L router. A crafted POST request that supplies an oversized curTime value triggers a buffer overflow in the internal memory handling logic. This overflow falls under classic buffer overflow weaknesses, identified as CWE‑119 and CWE‑120. If successfully exploited, an attacker could inject arbitrary code and gain complete control over the device, potentially allowing further compromise of the network.

Affected Systems

The only impacted product is the D‑Link DIR‑605L model running firmware version 2.13B01. This firmware revision is no longer supported by the vendor, so no official patches or security updates are available for it.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity level, but the EPSS score is not provided and the issue is not listed in the CISA KEV catalog. The exploit can be initiated remotely – any system that can reach the router’s management interface can send a malicious POST request to /goform/formSetDDNS. Because the device is unsupported, the risk remains high until the hardware is replaced or a future update is applied.

Generated by OpenCVE AI on April 9, 2026 at 23:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace the unsupported DIR‑605L router with a supported model that receives security updates
  • If replacement is not immediately possible, restrict external access to the router’s web interface using firewall rules or access control lists
  • Segment the network to isolate the router from critical infrastructure and prevent lateral movement
  • Continuously monitor router logs for suspicious POST requests to /goform/formSetDDNS and investigate any anomalies
  • Apply any future firmware updates from D‑Link as soon as they become available

Generated by OpenCVE AI on April 9, 2026 at 23:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-605l
Dlink dir-605l Firmware
CPEs cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-605l
Dlink dir-605l Firmware

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-605l
Vendors & Products D-link
D-link dir-605l

Thu, 09 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetDDNS of the file /goform/formSetDDNS of the component POST Request Handler. Executing a manipulation of the argument curTime can lead to buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-605L POST Request formSetDDNS buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-605l
Dlink Dir-605l Dir-605l Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-14T16:33:56.691Z

Reserved: 2026-04-09T12:18:30.613Z

Link: CVE-2026-5983

cve-icon Vulnrichment

Updated: 2026-04-14T15:16:31.181Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T22:16:37.663

Modified: 2026-04-30T15:22:52.457

Link: CVE-2026-5983

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:27:41Z

Weaknesses