<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5979 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5979/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 21:16:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5979/feed.xml" rel="self" type="application/rss+xml"/><item><title>D-Link DIR-605L Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-bo/</link><pubDate>Thu, 09 Apr 2026 21:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-bo/</guid><description>A remote buffer overflow vulnerability exists in the D-Link DIR-605L version 2.13B01 due to improper handling of the 'curTime' argument in the '/goform/formVirtualServ' POST request handler, potentially allowing attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, CVE-2026-5979, has been identified in D-Link DIR-605L router with firmware version 2.13B01. The vulnerability resides in the <code>formVirtualServ</code> function within the <code>/goform/formVirtualServ</code> component, specifically within the POST request handler. By manipulating the <code>curTime</code> argument, a remote attacker can trigger a buffer overflow. According to the NVD, an exploit is publicly available, increasing the risk of exploitation. This vulnerability affects end-of-life products, making patching impossible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable D-Link DIR-605L router running firmware 2.13B01.</li>
<li>Attacker crafts a malicious HTTP POST request targeting the <code>/goform/formVirtualServ</code> endpoint.</li>
<li>The POST request includes the <code>curTime</code> argument with a value exceeding the buffer&rsquo;s capacity.</li>
<li>The router&rsquo;s <code>formVirtualServ</code> function processes the POST request without proper bounds checking.</li>
<li>The oversized <code>curTime</code> value overwrites adjacent memory regions on the stack or heap.</li>
<li>The attacker carefully crafts the overflow payload to overwrite the return address.</li>
<li>Upon returning from the <code>formVirtualServ</code> function, control is transferred to the attacker-controlled address.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability (CVE-2026-5979) can lead to complete compromise of the D-Link DIR-605L router. Attackers could potentially execute arbitrary code, enabling them to modify router settings, intercept network traffic, or use the compromised device as a pivot point for further attacks within the network. Due to the product being end-of-life, a patch is not available. The number of vulnerable devices is unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor webserver logs for requests to <code>/goform/formVirtualServ</code> with unusually long <code>curTime</code> parameters to detect potential exploitation attempts (see Sigma rule &ldquo;Detect Suspiciously Long curTime Parameter in D-Link Routers&rdquo;).</li>
<li>Implement network intrusion detection system (IDS) rules to detect suspicious traffic patterns associated with buffer overflow exploits targeting web interfaces.</li>
<li>Since this device is end-of-life, consider replacing the D-Link DIR-605L router with a supported model to mitigate the risk, as there will be no patches issued.</li>
<li>Examine network traffic for unusual outbound connections originating from D-Link DIR-605L routers to identify potentially compromised devices (see Sigma rule &ldquo;Detect Outbound Connections from D-Link Routers&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>dlink</category><category>router</category><category>buffer_overflow</category><category>cve-2026-5979</category></item></channel></rss>