Impact
A buffer overflow flaw exists in the formSetPassword function of the D‑Link DIR‑513 router’s POST Request Handler. Manipulating the curTime argument allows an attacker to overflow the device’s memory stack, potentially executing arbitrary code. This can compromise the confidentiality, integrity, and availability of the affected system by granting the attacker full control over the device's software functions.
Affected Systems
The vulnerability affects the D‑Link DIR‑513 router model, version 1.10. The product is no longer supported by the vendor, yet it remains susceptible to exploitation.
Risk and Exploitability
With a CVSS score of 8.7, this flaw is classified as High severity. Although the EPSS score is not provided, the exploit has been publicly disclosed and can be carried out remotely by submitting a crafted POST request to /goform/formSetPassword. The flaw is not listed in the CISA KEV catalog, but the lack of vendor support increases the attack window. An attacker does not need any special privileges beyond remote network access to exploit the buffer overflow.
OpenCVE Enrichment