CVE-2026-6012 PUBLISHED

D-Link DIR-513 POST Request formSetPassword buffer overflow

Assigner: VulDB
Reserved: 09.04.2026 Published: 10.04.2026 Updated: 10.04.2026

A security vulnerability has been detected in D-Link DIR-513 1.10. This affects the function formSetPassword of the file /goform/formSetPassword of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CVSS Score: 8.7

Product Status

Vendor D-Link
Product DIR-513
Versions
  • Version 1.10 is affected

Credits

  • wxhwxhwxh_mie (VulDB User) reporter

References

Problem Types

  • Buffer Overflow CWE
  • Memory Corruption CWE