CVE-2026-5024 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 29, 2026
D-Link DIR-513 - Buffer Overflow
Overview
D-Link DIR-513 1.10 contains a stack-based buffer overflow caused by manipulation of the "curTime" argument in /goform/formSetEmail, letting remote attackers cause memory corruption, exploit requires no special privileges.
Severity & Score
Impact
Remote attackers can cause memory corruption leading to potential code execution or device crash.
Mitigation
Update to the latest supported version or replace the device as it is no longer supported.
References
Social Media Activity(4 posts)
š“ CVE-2026-5024: HIGH-severity stack buffer overflow in D-Link DIR-513 (v1.10). Remote, no auth needed, public exploit released. Replace ASAP or isolate device & restrict access. No patch from vendor. https://radar.offseq.com/threat/cve-2026-5024-stack-based-buffer-overflow-in-d-lin-e70f155a #OffSeq #Vulnerability #RouterSecurity
View original postš CVE-2026-5024 - High (8.8) A vulnerability was found in D-Link DIR-513 1.10. This issue affects the function formSetEmail of the file /goform/formSetEmail. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack is possible to be... š https://www.thehackerwire.com/vulnerability/CVE-2026-5024/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš“ CVE-2026-5024: HIGH-severity stack buffer overflow in D-Link DIR-513 (v1.10). Remote, no auth needed, public exploit released. Replace ASAP or isolate device & restrict access. No patch from vendor. https://radar.offseq.com/threat/cve-2026-5024-stack-based-buffer-overflow-in-d-lin-e70f155a #OffSeq #Vulnerability #RouterSecurity
View original postš CVE-2026-5024 - High (8.8) A vulnerability was found in D-Link DIR-513 1.10. This issue affects the function formSetEmail of the file /goform/formSetEmail. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack is possible to be... š https://www.thehackerwire.com/vulnerability/CVE-2026-5024/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-5024
- Severity
- High
- CVSS Score
- 8.8
- Type
- buffer_overflow
- Status
- new
- EPSS
- 0.0%
- Social Posts
- 4
CWE
- CWE-119
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H