Impact
A buffer overflow exists in the formSetLog function of the D‑Link DIR‑605L POST Request Handler. The overflow is triggered by malicious manipulation of the curTime argument sent to the /goform/formSetLog endpoint. According to the description, the exploit can be carried out remotely and is publicly available, potentially allowing an attacker to gain arbitrary code execution, lead to denial of service, or compromise the device’s integrity.
Affected Systems
The vulnerability affects the D‑Link DIR‑605L router running firmware 2.13B01. The device is no longer supported by the maintainer; therefore no official patch is expected for this exact model/firmware combination.
Risk and Exploitability
Scored high with a CVSS base of 8.7 and no EPSS data available; it is not listed in the CISA KEV catalog. Because the attack can be performed remotely via a crafted POST request to /goform/formSetLog, the risk to any network that permits external traffic to the router is significant. Given that the exploit is publicly known, the possibility of widespread exploitation remains, especially for the unsupported fleet.
OpenCVE Enrichment