Description
A flaw has been found in D-Link DIR-513 1.10. This issue affects the function formAdvanceSetup of the file /goform/formAdvanceSetup of the component POST Request Handler. This manipulation of the argument webpage causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-04-10
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow flaw exists in the formAdvanceSetup function of the POST Request Handler on D‑Link DIR‑513 routers. The vulnerability arises from improper handling of the webpage argument, allowing an attacker to send crafted input that overflows memory. This weakness, classified as CWE‑119 and CWE‑120, can lead to arbitrary code execution when exploited remotely.

Affected Systems

The vulnerability affects D‑Link DIR‑513 units running firmware version 1.10. This model is no longer supported by the vendor, meaning no official patches are currently available through regular channels.

Risk and Exploitability

The flaw carries a high CVSS score of 8.7, indicating severe impact. Although no EPSS score is provided and the issue is not listed in the CISA KEV catalog, an exploit has already been published and is potentially in use. The attack vector is remote, via HTTP POST requests to the /goform/formAdvanceSetup endpoint, and does not require privileged access to the device.

Generated by OpenCVE AI on April 10, 2026 at 05:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for any firmware update or security patch from D‑Link for the DIR‑513 model and apply it immediately.
  • If no patch is available, discontinue remote management of the device and remove the web interface from the network.
  • Configure network firewall rules to block unauthenticated HTTP traffic to the router’s web administration port.
  • Continuously monitor router logs for abnormal POST requests to /goform/formAdvanceSetup and alert on suspicious activity.

Generated by OpenCVE AI on April 10, 2026 at 05:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-513
Dlink dir-513 Firmware
CPEs cpe:2.3:h:dlink:dir-513:a2:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-513_firmware:1.10:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-513
Dlink dir-513 Firmware

Fri, 10 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-513
Vendors & Products D-link
D-link dir-513

Fri, 10 Apr 2026 04:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in D-Link DIR-513 1.10. This issue affects the function formAdvanceSetup of the file /goform/formAdvanceSetup of the component POST Request Handler. This manipulation of the argument webpage causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-513 POST Request formAdvanceSetup buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-513
Dlink Dir-513 Dir-513 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T11:58:43.540Z

Reserved: 2026-04-09T14:36:43.556Z

Link: CVE-2026-6014

cve-icon Vulnrichment

Updated: 2026-04-10T11:58:34.600Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T05:16:07.510

Modified: 2026-04-30T14:05:22.060

Link: CVE-2026-6014

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:46Z

Weaknesses