Vulnerability Description
A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetDDNS of the file /goform/formSetDDNS of the component POST Request Handler. Executing a manipulation of the argument curTime can lead to buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-605L Firmware | 2.13b01 |
| Dlink | Dir-605L | - |
Related Weaknesses (CWE)
References
- https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formSetDDNS-33153a41781ExploitThird Party Advisory
- https://vuldb.com/submit/791856Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/356537Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/356537/ctiPermissions RequiredVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2026-5983?
CVE-2026-5983 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetDDNS of the file /goform/formSetDDNS of the component POST Request Handler. Executing a manipulation o...
How severe is CVE-2026-5983?
CVE-2026-5983 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5983?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-605L Firmware, Dlink Dir-605L.