A vulnerability was found in D-Link DIR-513 1.10. This issue affects the function formSetEmail of the file /goform/formSetEmail. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
| Link | Resource |
|---|---|
| https://github.com/Litengzheng/vul_db/blob/main/Dir513/vul_30/README.md | Exploit Third Party Advisory |
| https://vuldb.com/submit/778414 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/353908 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/353908/cti | Permissions Required VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
30 Mar 2026, 19:00
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Dlink dir-513 Firmware
Dlink Dlink dir-513 |
|
| CPE | cpe:2.3:o:dlink:dir-513_firmware:1.10:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-513:-:*:*:*:*:*:*:* |
|
| CWE | CWE-787 | |
| References | () https://github.com/Litengzheng/vul_db/blob/main/Dir513/vul_30/README.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/submit/778414 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/353908 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/353908/cti - Permissions Required, VDB Entry | |
| References | () https://www.dlink.com/ - Product |
Information
Published : 2026-03-29 04:16
Updated : 2026-03-30 19:00
NVD link : CVE-2026-5024
Mitre link : CVE-2026-5024
CVE.ORG link : CVE-2026-5024
JSON object : View
Products Affected
dlink
- dir-513
- dir-513_firmware
