{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4555","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-21T17:01:53.514Z","datePublished":"2026-03-22T16:51:22.507Z","dateUpdated":"2026-03-23T15:28:12.714Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-22T16:51:22.507Z"},"title":"D-Link DIR-513 boa formEasySetTimezone memory corruption","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-121","lang":"en","description":"Stack-based Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"D-Link","product":"DIR-513","versions":[{"version":"1.10","status":"affected"}],"modules":["boa"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in D-Link DIR-513 1.10. The impacted element is the function formEasySetTimezone of the file /goform/formEasySetTimezone of the component boa. This manipulation of the argument curTime causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-21T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-21T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-21T18:07:09.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LtzHust2 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.352382","name":"VDB-352382 | D-Link DIR-513 boa formEasySetTimezone memory corruption","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.352382","name":"VDB-352382 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.774936","name":"Submit #774936 | D-Link DIR-513 1.10 Stack-based Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/Litengzheng/vul_db/blob/main/Dir513/vul_24/README.md","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-23T15:28:03.109187Z","id":"CVE-2026-4555","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-23T15:28:12.714Z"}}]}}