Impact
A buffer overflow exists in the formSetRoute functionality of the POST request handler on D‑Link DIR‑513 devices running firmware 1.10. The vulnerability is triggered by manipulating the curTime parameter and can be leveraged remotely to overwrite memory, leading to arbitrary code execution or denial of service. The bug is classified under CWE‑119 and CWE‑120. It is publicly known and exploit code is available, meaning a remote attacker can execute the payload without additional conditions.
Affected Systems
The affected device is the D‑Link DIR‑513 router with firmware version 1.10, which is no longer supported by the vendor. No other products or versions are listed as vulnerable.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity impact. EPSS data is not available, but the vulnerability is currently exploited in the wild and is not catalogued by CISA KEV. Attackers can reach the vulnerable endpoint over the network, typically from the internet or an internal network, making the risk significant for any exposed router. Once exploited, the attacker can gain full control of the device’s web interface and underlying operating system.
OpenCVE Enrichment