Description
A security vulnerability has been detected in D-Link DIR-513 1.10. This affects the function formSetPassword of the file /goform/formSetPassword of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-04-10
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow flaw exists in the formSetPassword function of the D‑Link DIR‑513 router’s POST Request Handler. Manipulating the curTime argument allows an attacker to overflow the device’s memory stack, potentially executing arbitrary code. This can compromise the confidentiality, integrity, and availability of the affected system by granting the attacker full control over the device's software functions.

Affected Systems

The vulnerability affects the D‑Link DIR‑513 router model, version 1.10. The product is no longer supported by the vendor, yet it remains susceptible to exploitation.

Risk and Exploitability

With a CVSS score of 8.7, this flaw is classified as High severity. Although the EPSS score is not provided, the exploit has been publicly disclosed and can be carried out remotely by submitting a crafted POST request to /goform/formSetPassword. The flaw is not listed in the CISA KEV catalog, but the lack of vendor support increases the attack window. An attacker does not need any special privileges beyond remote network access to exploit the buffer overflow.

Generated by OpenCVE AI on April 10, 2026 at 05:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and install the latest firmware update for the D‑Link DIR‑513
  • If no update is available, disable the router’s web management interface or block access to /goform/formSetPassword from untrusted networks
  • Monitor device logs for unusual POST requests to the formSetPassword endpoint
  • Isolate the device from critical infrastructure and limit exposure
  • Report any suspicious activity to the vendor

Generated by OpenCVE AI on April 10, 2026 at 05:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-513
Dlink dir-513 Firmware
CPEs cpe:2.3:h:dlink:dir-513:a2:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-513_firmware:1.10:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-513
Dlink dir-513 Firmware

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-513
Vendors & Products D-link
D-link dir-513

Fri, 10 Apr 2026 04:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in D-Link DIR-513 1.10. This affects the function formSetPassword of the file /goform/formSetPassword of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-513 POST Request formSetPassword buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-513
Dlink Dir-513 Dir-513 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T15:54:28.106Z

Reserved: 2026-04-09T14:36:30.211Z

Link: CVE-2026-6012

cve-icon Vulnrichment

Updated: 2026-04-10T15:48:30.956Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T05:16:07.027

Modified: 2026-04-30T14:14:15.330

Link: CVE-2026-6012

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:49Z

Weaknesses