Description
A vulnerability was identified in D-Link DIR-605L 2.13B01. Impacted is the function formSetLog of the file /goform/formSetLog of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-04-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate patch
AI Analysis

Impact

A buffer overflow exists in the formSetLog function of the D‑Link DIR‑605L POST Request Handler. The overflow is triggered by malicious manipulation of the curTime argument sent to the /goform/formSetLog endpoint. According to the description, the exploit can be carried out remotely and is publicly available, potentially allowing an attacker to gain arbitrary code execution, lead to denial of service, or compromise the device’s integrity.

Affected Systems

The vulnerability affects the D‑Link DIR‑605L router running firmware 2.13B01. The device is no longer supported by the maintainer; therefore no official patch is expected for this exact model/firmware combination.

Risk and Exploitability

Scored high with a CVSS base of 8.7 and no EPSS data available; it is not listed in the CISA KEV catalog. Because the attack can be performed remotely via a crafted POST request to /goform/formSetLog, the risk to any network that permits external traffic to the router is significant. Given that the exploit is publicly known, the possibility of widespread exploitation remains, especially for the unsupported fleet.

Generated by OpenCVE AI on April 9, 2026 at 23:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify if your network uses a D-Link DIR-605L firmware 2.13B01 or earlier; if so, consider replacing the device with a supported model.
  • Restrict external access to the router’s web interface; block or filter incoming traffic to the /goform/formSetLog endpoint.
  • Apply any firmware updates that D-Link publishes for newer, supported devices.
  • Monitor the router for signs of compromise and enable logging to detect suspicious POST traffic.
  • Review the vendor’s support status and upgrade to a device with active security updates.

Generated by OpenCVE AI on April 9, 2026 at 23:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-605l
Dlink dir-605l Firmware
CPEs cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-605l
Dlink dir-605l Firmware

Fri, 10 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-605l
Vendors & Products D-link
D-link dir-605l

Thu, 09 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in D-Link DIR-605L 2.13B01. Impacted is the function formSetLog of the file /goform/formSetLog of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-605L POST Request formSetLog buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-605l
Dlink Dir-605l Dir-605l Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T17:08:23.078Z

Reserved: 2026-04-09T12:18:33.614Z

Link: CVE-2026-5984

cve-icon Vulnrichment

Updated: 2026-04-10T17:08:17.226Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T22:16:37.873

Modified: 2026-04-30T15:19:11.653

Link: CVE-2026-5984

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:27:39Z

Weaknesses