CVE-2026-6012
D-Link DIR-513 POST Request formSetPassword buffer overflow
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
14th
A security vulnerability has been detected in D-Link DIR-513 1.10. This affects the function formSetPassword of the file /goform/formSetPassword of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
| CWE | CWE-120 CWE-119 |
| Vendor | d-link |
| Product | dir-513 |
| Published | Apr 10, 2026 |
| Last Updated | Apr 10, 2026 |
Stay Ahead of the Next One
Get instant alerts for d-link dir-513
Be the first to know when new high vulnerabilities affecting d-link dir-513 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
D-Link / DIR-513
1.10
References
vuldb.com: https://vuldb.com/vuln/356568 vuldb.com: https://vuldb.com/vuln/356568/cti vuldb.com: https://vuldb.com/submit/791858 lavender-bicycle-a5a.notion.site: https://lavender-bicycle-a5a.notion.site/D-Link-DIR-513-formSetPassword-33153a41781f806e9a3cf63a5a9091ac?source=copy_link dlink.com: https://www.dlink.com/
Credits
๐ wxhwxhwxh_mie (VulDB User)