Impact
A buffer overflow flaw exists in the formAdvanceSetup function of the POST Request Handler on D‑Link DIR‑513 routers. The vulnerability arises from improper handling of the webpage argument, allowing an attacker to send crafted input that overflows memory. This weakness, classified as CWE‑119 and CWE‑120, can lead to arbitrary code execution when exploited remotely.
Affected Systems
The vulnerability affects D‑Link DIR‑513 units running firmware version 1.10. This model is no longer supported by the vendor, meaning no official patches are currently available through regular channels.
Risk and Exploitability
The flaw carries a high CVSS score of 8.7, indicating severe impact. Although no EPSS score is provided and the issue is not listed in the CISA KEV catalog, an exploit has already been published and is potentially in use. The attack vector is remote, via HTTP POST requests to the /goform/formAdvanceSetup endpoint, and does not require privileged access to the device.
OpenCVE Enrichment