{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5981","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-09T12:18:23.955Z","datePublished":"2026-04-09T21:15:20.887Z","dateUpdated":"2026-04-13T20:37:56.459Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-09T21:15:20.887Z"},"title":"D-Link DIR-605L POST Request formAdvFirewall buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"D-Link","product":"DIR-605L","versions":[{"version":"2.13B01","status":"affected"}],"modules":["POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in D-Link DIR-605L 2.13B01. This affects the function formAdvFirewall of the file /goform/formAdvFirewall of the component POST Request Handler. Such manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-09T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-09T14:23:58.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"wxhwxhwxh_mie (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/356535","name":"VDB-356535 | D-Link DIR-605L POST Request formAdvFirewall buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/356535/cti","name":"VDB-356535 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/791854","name":"Submit #791854 | D-Link DIR-605L D-Link DIR-605L 2.13B01 BETA Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formAdvFirewall-33153a41781f80678733f4b12282f3fa?source=copy_link","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["broken-link","product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-13T20:37:45.451841Z","id":"CVE-2026-5981","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-13T20:37:56.459Z"}}]}}