Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70218: n/a

0
Critical
VulnerabilityCVE-2025-70218cvecve-2025-70218
Published: Wed Mar 04 2026 (03/04/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via POST to the goform/formAdvFirewall component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 19:48:35 UTC

Technical Analysis

CVE-2025-70218 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-513 router firmware version 1.10. The flaw exists in the handling of POST requests sent to the goform/formAdvFirewall component, which is part of the router's advanced firewall configuration interface. An attacker can exploit this vulnerability remotely without any authentication or user interaction by sending a specially crafted POST request that overflows a stack buffer, leading to arbitrary code execution. This vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), which typically allows attackers to overwrite the return address or control data on the stack, enabling them to execute malicious payloads. The CVSS v3.1 base score of 9.8 indicates a critical severity, with attack vector Network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts to confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). Despite the high severity, there are no known exploits in the wild and no patches currently available, which increases the urgency for affected users to implement mitigations. The vulnerability could be leveraged to gain full control over the router, allowing attackers to manipulate network traffic, intercept sensitive data, or launch further attacks within the network.

Potential Impact

The impact of CVE-2025-70218 on organizations is substantial. Successful exploitation can lead to complete compromise of the affected router, resulting in unauthorized access to internal networks, interception or modification of network traffic, and disruption of network services. This can facilitate data breaches, espionage, or the establishment of persistent footholds for further attacks. For enterprises relying on D-Link DIR-513 routers, especially in branch offices or remote locations, this vulnerability could undermine network security and confidentiality. The lack of authentication and user interaction requirements means attackers can exploit this remotely and stealthily. Additionally, compromised routers could be used as launch points for attacks against other internal systems or as part of botnets, amplifying the threat landscape. The absence of patches increases the window of exposure, making timely mitigation critical to prevent potential damage.

Mitigation Recommendations

Given the absence of official patches, organizations should adopt a multi-layered mitigation approach. First, immediately disable remote management interfaces on the affected routers to prevent external exploitation. Restrict access to the router’s administrative interface to trusted internal networks only, using network segmentation and firewall rules. Monitor network traffic for unusual POST requests targeting the goform/formAdvFirewall endpoint, employing intrusion detection systems (IDS) or web application firewalls (WAF) where possible. Consider replacing or upgrading affected devices to models with updated firmware once patches become available. Engage with D-Link support channels to obtain information on planned fixes or beta patches. Additionally, implement network-level protections such as VPNs for remote access and enforce strong network access controls to limit exposure. Regularly audit and inventory network devices to identify vulnerable routers and prioritize remediation efforts. Finally, educate IT staff about this vulnerability to ensure rapid response if exploitation attempts are detected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a87078d1a09e29cb506b66

Added to database: 3/4/2026, 5:48:40 PM

Last enriched: 3/11/2026, 7:48:35 PM

Last updated: 4/18/2026, 8:21:23 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses