CVE-2026-4486
Published: 20 March 2026
Summary
CVE-2026-4486 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Dlink Dir-513. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Information input validation directly prevents manipulation of the curTime argument that triggers the stack-based buffer overflow in the formEasySetPassword function.
Memory protection mechanisms such as ASLR and non-executable stacks mitigate exploitation of the stack-based buffer overflow even if invalid input is processed.
Flaw remediation requires addressing the known buffer overflow vulnerability through patching, configuration hardening, or removal of the unsupported vulnerable component.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack-based buffer overflow in public-facing web service (/goform/formEasySetPassword) with PR:L allows remote unauthenticated-style RCE on network device, directly enabling T1190 (exploit public-facing app) and T1068 (exploitation for privilege escalation to full code execution).
NVD Description
A vulnerability was found in D-Link DIR-513 1.10. This affects the function formEasySetPassword of the file /goform/formEasySetPassword of the component Web Service. The manipulation of the argument curTime results in stack-based buffer overflow. The attack may be performed from remote.…
more
The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Deeper analysisAI
CVE-2026-4486 is a stack-based buffer overflow vulnerability (CWE-119, CWE-121, CWE-787) in D-Link DIR-513 firmware version 1.10. It affects the formEasySetPassword function within the /goform/formEasySetPassword file of the Web Service component, triggered by manipulation of the curTime argument.
The vulnerability enables remote exploitation by attackers with low privileges (PR:L), requiring low attack complexity and no user interaction (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, score 8.8). Successful attacks can result in high impacts to confidentiality, integrity, and availability, potentially leading to arbitrary code execution.
References, including VulDB entries and GitHub repositories, disclose a public proof-of-concept exploit. The vulnerability only affects products no longer supported by the maintainer, with no patches available; mitigation relies on network isolation or device replacement.
A public exploit exists and could be used against vulnerable devices.
Details
- CWE(s)