CVE-2026-4486 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 20, 2026
D-Link DIR-513 - Buffer Overflow
Published: March 20, 2026Updated: March 20, 2026Remote Exploitable
Overview
D-Link DIR-513 1.10 contains a stack-based buffer overflow caused by manipulation of the "curTime" argument in /goform/formEasySetPassword Web Service, letting remote attackers cause memory corruption, exploit requires crafted request.
Severity & Score
Severity: High
CVSS Score: 8.8
Impact
Remote attackers can cause memory corruption, potentially leading to denial of service or remote code execution.
Mitigation
Update to the latest supported version or replace unsupported product.
References
- https://vuldb.com/?submit.773537
- https://vuldb.com/?submit.773566
- https://www.dlink.com/
- https://github.com/InfiniteLin/Lin-s-CVEdb/blob/main/DIR-513/formEasySetPassword/formEasySetPassword.md
- https://github.com/InfiniteLin/Lin-s-CVEdb/blob/main/DIR-513/formEasySetPassword/poc.py
- https://vuldb.com/?ctiid.352009
- https://vuldb.com/?id.352009
Related Resources
Details
- CVE ID
- CVE-2026-4486
- Severity
- High
- CVSS Score
- 8.8
- Type
- buffer_overflow
- Status
- new
CWE
- CWE-119
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H