A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetDDNS of the file /goform/formSetDDNS of the component POST Request Handler. Executing a manipulation of the argument curTime can lead to buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
References
| Link | Resource |
|---|---|
| https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formSetDDNS-33153a41781f802f9997f48dc9cf6304?source=copy_link | Exploit Third Party Advisory |
| https://vuldb.com/submit/791856 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/356537 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/356537/cti | Permissions Required VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
30 Apr 2026, 15:22
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Dlink dir-605l
Dlink Dlink dir-605l Firmware |
|
| CPE | cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:* |
|
| References | () https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formSetDDNS-33153a41781f802f9997f48dc9cf6304?source=copy_link - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/submit/791856 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/356537 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/356537/cti - Permissions Required, VDB Entry | |
| References | () https://www.dlink.com/ - Product |
09 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 22:16
Updated : 2026-04-30 15:22
NVD link : CVE-2026-5983
Mitre link : CVE-2026-5983
CVE.ORG link : CVE-2026-5983
JSON object : View
Products Affected
dlink
- dir-605l
- dir-605l_firmware
