Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4486: Stack-based Buffer Overflow in D-Link DIR-513

0
High
VulnerabilityCVE-2026-4486cvecve-2026-4486
Published: Fri Mar 20 2026 (03/20/2026, 14:02:14 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-513

Description

A vulnerability was found in D-Link DIR-513 1.10. This affects the function formEasySetPassword of the file /goform/formEasySetPassword of the component Web Service. The manipulation of the argument curTime results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 03/20/2026, 14:38:57 UTC

Technical Analysis

CVE-2026-4486 identifies a stack-based buffer overflow vulnerability in the D-Link DIR-513 router, version 1.10, specifically within the formEasySetPassword function of the web service component located at /goform/formEasySetPassword. The vulnerability is triggered by manipulating the curTime argument, which is improperly handled, leading to a stack overflow condition. This flaw allows remote attackers to execute arbitrary code without requiring authentication or user interaction, making exploitation relatively straightforward if the device is accessible remotely. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed, combined with high impact on confidentiality, integrity, and availability. Despite the exploit being publicly available, the affected product is no longer supported by D-Link, and no official patches have been released. This increases the risk for legacy devices still operational in networks, as they remain vulnerable to remote compromise. The vulnerability could be leveraged to take full control of the device, disrupt network operations, or pivot to internal networks. Given the device’s age and discontinued support, mitigation primarily involves network-level controls or device replacement.

Potential Impact

The impact of CVE-2026-4486 is significant for organizations that continue to operate the D-Link DIR-513 router version 1.10, especially if these devices are exposed to untrusted networks such as the internet. Successful exploitation can lead to remote code execution, allowing attackers to gain full control over the router. This compromises the confidentiality of network traffic, the integrity of routing and firewall rules, and the availability of network services. Attackers could use the compromised router as a foothold to launch further attacks within the internal network, intercept sensitive data, or disrupt business operations. Since the device is no longer supported, organizations cannot rely on vendor patches, increasing the risk of persistent exploitation. The presence of public exploits further elevates the threat, as automated attacks or malware campaigns could target vulnerable devices. The overall impact is heightened in environments where these routers serve as critical network gateways or are part of legacy infrastructure that cannot be easily replaced.

Mitigation Recommendations

Given the lack of official patches due to discontinued support, organizations should prioritize the following mitigation strategies: 1) Immediate replacement of the D-Link DIR-513 routers with currently supported and patched devices to eliminate the vulnerability. 2) If replacement is not immediately feasible, isolate the vulnerable routers by placing them behind firewalls or within segmented network zones that restrict inbound access to the web service interface, especially from untrusted networks. 3) Disable or restrict access to the vulnerable formEasySetPassword web service endpoint if possible, to prevent exploitation. 4) Monitor network traffic for unusual activity or signs of exploitation attempts targeting the router’s management interface. 5) Implement strict network access controls and VPNs for remote management to reduce exposure. 6) Educate network administrators about the risks of legacy devices and the importance of timely hardware lifecycle management. 7) Regularly audit network devices to identify unsupported hardware and prioritize their upgrade or decommissioning. These steps go beyond generic advice by focusing on compensating controls and proactive device lifecycle management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-20T08:18:38.288Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bd5895e32a4fbe5f9d858c

Added to database: 3/20/2026, 2:24:21 PM

Last enriched: 3/20/2026, 2:38:57 PM

Last updated: 3/20/2026, 3:25:05 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses