Buffer Overflow in D-Link DIR-513 Affects Security of Device Configuration
CVE-2026-6012
Key Information:
Badges
What is CVE-2026-6012?
A security vulnerability in the D-Link DIR-513 device affects the function formSetPassword within the file /goform/formSetPassword. Manipulation of the curTime argument can lead to a buffer overflow, which allows remote attackers to exploit this vulnerability. This issue can be especially concerning as it pertains to products that are no longer supported by D-Link, making them more vulnerable to potential attacks. Public disclosure of this exploit heightens the risk for users operating this device without proper security measures.
Affected Version(s)
DIR-513 1.10
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved