Vulnerability Description
A vulnerability was detected in D-Link DIR-513 1.10. This vulnerability affects the function formSetRoute of the file /goform/formSetRoute of the component POST Request Handler. The manipulation of the argument curTime results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-513 Firmware | 1.10 |
| Dlink | Dir-513 | a2 |
Related Weaknesses (CWE)
References
- https://lavender-bicycle-a5a.notion.site/D-Link-DIR-513-formSetRoute-33153a41781ExploitThird Party Advisory
- https://vuldb.com/submit/791859Third Party AdvisoryVendor Advisory
- https://vuldb.com/vuln/356569Third Party AdvisoryVendor Advisory
- https://vuldb.com/vuln/356569/ctiPermissions RequiredVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2026-6013?
CVE-2026-6013 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability was detected in D-Link DIR-513 1.10. This vulnerability affects the function formSetRoute of the file /goform/formSetRoute of the component POST Request Handler. The manipulation of th...
How severe is CVE-2026-6013?
CVE-2026-6013 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-6013?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-513 Firmware, Dlink Dir-513.