CVE-2026-4555
Received Received - Intake
Stack-Based Buffer Overflow in D-Link DIR-513 Remote Function

Publication date: 2026-03-22

Last updated on: 2026-04-03

Assigner: VulDB

Description
A weakness has been identified in D-Link DIR-513 1.10. The impacted element is the function formEasySetTimezone of the file /goform/formEasySetTimezone of the component boa. This manipulation of the argument curTime causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-22
Last Modified
2026-04-03
Generated
2026-05-07
AI Q&A
2026-03-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dlink dir-513_firmware 1.10
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-119 The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by sending a specially crafted HTTP POST request to the endpoint /goform/formEasySetTimezone on the D-Link DIR-513 router running firmware version 1.10.'}, {'type': 'paragraph', 'content': 'The POST request should include an excessively long "curTime" parameter to test for the stack-based buffer overflow.'}, {'type': 'paragraph', 'content': 'A proof of concept involves sending a POST request with a large payload of repeated \'a\' characters in the "curTime" parameter.'}, {'type': 'list_item', 'content': 'Use curl or similar HTTP client tools to send the test request, for example:'}, {'type': 'list_item', 'content': 'curl -X POST http://<router-ip>/goform/formEasySetTimezone -d "curTime=$(python3 -c \'print("a"*1000)\')"'}, {'type': 'paragraph', 'content': 'If the device crashes, becomes unresponsive, or exhibits abnormal behavior after this request, it indicates the presence of the vulnerability.'}] [1]


Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-4555 is a stack-based buffer overflow vulnerability found in the D-Link DIR-513 router firmware version 1.10. It exists in the Boa web server component, specifically in the formEasySetTimezone function that processes a user-supplied parameter called "curTime."'}, {'type': 'paragraph', 'content': 'The vulnerability occurs because the "curTime" parameter is passed to the sprintf function without any bounds checking, allowing an attacker to overflow the stack buffer by sending an excessively long value.'}, {'type': 'paragraph', 'content': 'This can be exploited remotely by sending a specially crafted HTTP POST request to the /goform/formEasySetTimezone endpoint with a large payload in the "curTime" parameter, potentially leading to denial of service or remote code execution on the device.'}] [1]


How can this vulnerability impact me? :

This vulnerability can have serious impacts including denial of service (DoS) and remote code execution (RCE) on the affected D-Link DIR-513 router.

An attacker can remotely exploit this flaw to crash the device or execute arbitrary code, potentially gaining control over the router.

Since the device is no longer supported by the maintainer, no official patches are available, increasing the risk of exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Since the affected D-Link DIR-513 router with firmware version 1.10 is no longer supported by the maintainer, no official patches or updates are available.'}, {'type': 'paragraph', 'content': 'Immediate mitigation steps include:'}, {'type': 'list_item', 'content': "Disable remote access to the router's web interface to prevent exploitation over the network."}, {'type': 'list_item', 'content': "Restrict network access to the router's management interface to trusted hosts only."}, {'type': 'list_item', 'content': 'Monitor network traffic for suspicious POST requests to /goform/formEasySetTimezone with unusually large "curTime" parameters.'}, {'type': 'list_item', 'content': 'Consider replacing the affected device with a supported model that receives security updates.'}] [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart