CVE-2026-5983
D-Link DIR-605L POST Request formSetDDNS buffer overflow
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetDDNS of the file /goform/formSetDDNS of the component POST Request Handler. Executing a manipulation of the argument curTime can lead to buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
| CWE | CWE-120 CWE-119 |
| Vendor | d-link |
| Product | dir-605l |
| Published | Apr 9, 2026 |
| Last Updated | Apr 14, 2026 |
Stay Ahead of the Next One
Get instant alerts for d-link dir-605l
Be the first to know when new high vulnerabilities affecting d-link dir-605l are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
D-Link / DIR-605L
2.13B01
References
vuldb.com: https://vuldb.com/vuln/356537 vuldb.com: https://vuldb.com/vuln/356537/cti vuldb.com: https://vuldb.com/submit/791856 lavender-bicycle-a5a.notion.site: https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formSetDDNS-33153a41781f802f9997f48dc9cf6304?source=copy_link dlink.com: https://www.dlink.com/
Credits
๐ wxhwxhwxh_mie (VulDB User)