Impact
The vulnerability exists in the formSetDDNS endpoint of the D‑Link DIR‑605L router. A crafted POST request that supplies an oversized curTime value triggers a buffer overflow in the internal memory handling logic. This overflow falls under classic buffer overflow weaknesses, identified as CWE‑119 and CWE‑120. If successfully exploited, an attacker could inject arbitrary code and gain complete control over the device, potentially allowing further compromise of the network.
Affected Systems
The only impacted product is the D‑Link DIR‑605L model running firmware version 2.13B01. This firmware revision is no longer supported by the vendor, so no official patches or security updates are available for it.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity level, but the EPSS score is not provided and the issue is not listed in the CISA KEV catalog. The exploit can be initiated remotely – any system that can reach the router’s management interface can send a malicious POST request to /goform/formSetDDNS. Because the device is unsupported, the risk remains high until the hardware is replaced or a future update is applied.
OpenCVE Enrichment