๐Ÿ” CVE Alert

CVE-2026-5024

HIGH 8.8

D-Link DIR-513 formSetEmail stack-based overflow

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
14th

A vulnerability was found in D-Link DIR-513 1.10. This issue affects the function formSetEmail of the file /goform/formSetEmail. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

CWE CWE-121 CWE-119
Vendor d-link
Product dir-513
Published Mar 29, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for d-link dir-513

Be the first to know when new high vulnerabilities affecting d-link dir-513 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

D-Link / DIR-513
1.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/353908 vuldb.com: https://vuldb.com/vuln/353908/cti vuldb.com: https://vuldb.com/submit/778414 github.com: https://github.com/Litengzheng/vul_db/blob/main/Dir513/vul_30/README.md dlink.com: https://www.dlink.com/

Credits

๐Ÿ” LtzHust2 (VulDB User)