Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4465: OS Command Injection in D-Link DIR-513

0
Medium
VulnerabilityCVE-2026-4465cvecve-2026-4465
Published: Fri Mar 20 2026 (03/20/2026, 02:02:14 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-513

Description

A flaw has been found in D-Link DIR-513 1.10. The impacted element is an unknown function of the file /goform/formSysCmd. Executing a manipulation of the argument sysCmd can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 03/20/2026, 02:39:10 UTC

Technical Analysis

CVE-2026-4465 is a medium-severity OS command injection vulnerability affecting the D-Link DIR-513 router running firmware version 1.10. The vulnerability resides in an unspecified function accessed via the /goform/formSysCmd endpoint, where the sysCmd parameter is insufficiently sanitized, allowing an attacker to inject and execute arbitrary operating system commands remotely. The attack vector is network-based, requiring no user interaction and low privileges, making it relatively easy to exploit if the device is reachable. The vulnerability impacts confidentiality, integrity, and availability by enabling command execution on the device, potentially leading to full device compromise. The affected product is no longer supported by the vendor, and no patches have been released. While no active exploits have been observed in the wild, a public exploit exists, increasing the risk of exploitation. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability, resulting in a base score of 5.3. This vulnerability highlights risks associated with legacy network devices that remain in operational environments without vendor support or security updates.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary OS commands on affected D-Link DIR-513 routers, potentially leading to full device compromise. This can result in unauthorized access to network traffic, interception or manipulation of data, disruption of network services, or use of the device as a foothold for further attacks within an organization’s network. Since the device is a network router, compromise could affect the confidentiality and integrity of data passing through it and availability of network connectivity. The lack of vendor support and patches increases the risk, as organizations cannot remediate via firmware updates. Exploitation could facilitate lateral movement, data exfiltration, or deployment of malware. Organizations relying on these legacy devices in critical network segments face elevated operational and security risks.

Mitigation Recommendations

Given the absence of official patches, organizations should prioritize immediate replacement of the D-Link DIR-513 devices with supported hardware running updated firmware. If replacement is not immediately feasible, network-level mitigations should be implemented: restrict access to the device’s management interfaces by applying firewall rules to limit exposure to trusted networks only; disable remote management features if enabled; monitor network traffic for suspicious activity targeting the /goform/formSysCmd endpoint; employ intrusion detection/prevention systems with signatures for this vulnerability or command injection attempts; segment legacy devices on isolated network segments to reduce attack surface; and enforce strong network access controls and logging to detect and respond to exploitation attempts. Regularly auditing network devices for outdated firmware and unsupported hardware can prevent similar risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-19T20:28:56.507Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcafd9e32a4fbe5f174cff

Added to database: 3/20/2026, 2:24:25 AM

Last enriched: 3/20/2026, 2:39:10 AM

Last updated: 3/20/2026, 3:32:53 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses