top of page
perceptive_background_267k.jpg

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard52.

Published:

8 maart 2026 om 23:00:00

Alert date:

9 maart 2026 om 21:02:12

Source:

nvd.nist.gov

Click to open the original link from this advisory

Network Infrastructure, Mobile & IoT

A stack buffer overflow vulnerability has been identified in D-Link DIR-513 router version 1.10. The vulnerability is triggered through the curTime parameter in the goform/formSetWAN_Wizard52 endpoint. This type of vulnerability can potentially allow attackers to execute arbitrary code or cause denial of service by overwriting memory on the stack. The affected device is a wireless router commonly used in home and small business environments. The vulnerability affects the WAN setup wizard functionality of the device's web interface.

Technical details

Mitigation steps:

Affected products:

D-Link DIR-513

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page