D-Link DIR-605L Router Buffer Overflow Vulnerability
A remote buffer overflow vulnerability exists in the D-Link DIR-605L version 2.13B01 due to improper handling of the 'curTime' argument in the '/goform/formVirtualServ' POST request handler, potentially allowing attackers to execute arbitrary code.
A buffer overflow vulnerability, CVE-2026-5979, has been identified in D-Link DIR-605L router with firmware version 2.13B01. The vulnerability resides in the formVirtualServ function within the /goform/formVirtualServ component, specifically within the POST request handler. By manipulating the curTime argument, a remote attacker can trigger a buffer overflow. According to the NVD, an exploit is publicly available, increasing the risk of exploitation. This vulnerability affects end-of-life products, making patching impossible.
Attack Chain
- Attacker identifies a vulnerable D-Link DIR-605L router running firmware 2.13B01.
- Attacker crafts a malicious HTTP POST request targeting the
/goform/formVirtualServendpoint. - The POST request includes the
curTimeargument with a value exceeding the buffer’s capacity. - The router’s
formVirtualServfunction processes the POST request without proper bounds checking. - The oversized
curTimevalue overwrites adjacent memory regions on the stack or heap. - The attacker carefully crafts the overflow payload to overwrite the return address.
- Upon returning from the
formVirtualServfunction, control is transferred to the attacker-controlled address. - The attacker executes arbitrary code on the router, potentially gaining full control.
Impact
Successful exploitation of this buffer overflow vulnerability (CVE-2026-5979) can lead to complete compromise of the D-Link DIR-605L router. Attackers could potentially execute arbitrary code, enabling them to modify router settings, intercept network traffic, or use the compromised device as a pivot point for further attacks within the network. Due to the product being end-of-life, a patch is not available. The number of vulnerable devices is unknown.
Recommendation
- Monitor webserver logs for requests to
/goform/formVirtualServwith unusually longcurTimeparameters to detect potential exploitation attempts (see Sigma rule “Detect Suspiciously Long curTime Parameter in D-Link Routers”). - Implement network intrusion detection system (IDS) rules to detect suspicious traffic patterns associated with buffer overflow exploits targeting web interfaces.
- Since this device is end-of-life, consider replacing the D-Link DIR-605L router with a supported model to mitigate the risk, as there will be no patches issued.
- Examine network traffic for unusual outbound connections originating from D-Link DIR-605L routers to identify potentially compromised devices (see Sigma rule “Detect Outbound Connections from D-Link Routers”).
Detection coverage 2
Detect Suspiciously Long curTime Parameter in D-Link Routers
highDetects unusually long 'curTime' parameters in requests to '/goform/formVirtualServ', potentially indicating a buffer overflow attempt on D-Link routers.
Detect Outbound Connections from D-Link Routers
mediumDetects unusual outbound network connections originating from D-Link routers, potentially indicating a compromised device.
Detection queries are kept inside the platform. Get full rules →