Description
A vulnerability was detected in D-Link DIR-513 1.10. This vulnerability affects the function formSetRoute of the file /goform/formSetRoute of the component POST Request Handler. The manipulation of the argument curTime results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-04-10
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote buffer overflow potentially permitting code execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow exists in the formSetRoute functionality of the POST request handler on D‑Link DIR‑513 devices running firmware 1.10. The vulnerability is triggered by manipulating the curTime parameter and can be leveraged remotely to overwrite memory, leading to arbitrary code execution or denial of service. The bug is classified under CWE‑119 and CWE‑120. It is publicly known and exploit code is available, meaning a remote attacker can execute the payload without additional conditions.

Affected Systems

The affected device is the D‑Link DIR‑513 router with firmware version 1.10, which is no longer supported by the vendor. No other products or versions are listed as vulnerable.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity impact. EPSS data is not available, but the vulnerability is currently exploited in the wild and is not catalogued by CISA KEV. Attackers can reach the vulnerable endpoint over the network, typically from the internet or an internal network, making the risk significant for any exposed router. Once exploited, the attacker can gain full control of the device’s web interface and underlying operating system.

Generated by OpenCVE AI on April 10, 2026 at 05:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • If an updated firmware version exists, upgrade the DIR‑513 to the latest release that addresses the buffer overflow.
  • If no update is available, disable the formSetRoute feature in the router’s configuration or by removing the corresponding web page from the firmware.
  • Block all POST requests to /goform/formSetRoute using a firewall rule or access control list.
  • Monitor router logs for abnormal POST traffic and trigger alerts on large curTime values or repeated failures.
  • Consider replacing the unsupported DIR‑513 with a supported model from D‑Link or another vendor.

Generated by OpenCVE AI on April 10, 2026 at 05:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-513
Dlink dir-513 Firmware
CPEs cpe:2.3:h:dlink:dir-513:a2:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-513_firmware:1.10:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-513
Dlink dir-513 Firmware

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-513
Vendors & Products D-link
D-link dir-513

Fri, 10 Apr 2026 04:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in D-Link DIR-513 1.10. This vulnerability affects the function formSetRoute of the file /goform/formSetRoute of the component POST Request Handler. The manipulation of the argument curTime results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-513 POST Request formSetRoute buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-513
Dlink Dir-513 Dir-513 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T15:35:06.404Z

Reserved: 2026-04-09T14:36:33.246Z

Link: CVE-2026-6013

cve-icon Vulnrichment

Updated: 2026-04-10T15:34:59.563Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T05:16:07.303

Modified: 2026-04-30T14:10:16.980

Link: CVE-2026-6013

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:48Z

Weaknesses