Stack Buffer Overflow in D-Link DIR-513 v1.10 via /goform/formEasySetupWizard3
CVE-2026-3978 Published on March 12, 2026

D-Link DIR-513 formEasySetupWizard3 stack-based overflow
A vulnerability was detected in D-Link DIR-513 1.10. The impacted element is an unknown function of the file /goform/formEasySetupWizard3. The manipulation of the argument wan_connected results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

NVD

Timeline

Advisory disclosed

VulDB entry created

VulDB entry last update

Weakness Types

What is a Stack Overflow Vulnerability?

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).

CVE-2026-3978 has been classified to as a Stack Overflow vulnerability or weakness.

What is a Buffer Overflow Vulnerability?

The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

CVE-2026-3978 has been classified to as a Buffer Overflow vulnerability or weakness.


Affected Versions

D-Link DIR-513 Version 1.10 is affected by CVE-2026-3978