A stack-based buffer overflow vulnerability exists in D-Link DIR-605L Wireless N300 Cloud Router firmware versions 1.12 and 1.13 via the getAuthCode() function. The flaw arises from unsafe usage of sprintf() when processing user-supplied CAPTCHA data via the FILECODE parameter in /goform/formLogin. A remote unauthenticated attacker can exploit this to execute arbitrary code with root privileges on the device.
Use CWE-121, Dlink vendor hub and Dir-605l Firmware product page to widen CVE-2012-10021 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-4442, CVE-2025-4441 and CVE-2025-65731 for nearby disclosures in the same product family.