Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70220: n/a

0
Critical
VulnerabilityCVE-2025-70220cvecve-2025-70220
Published: Wed Mar 04 2026 (03/04/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAutoDetecWAN_wizard4.

AI-Powered Analysis

AILast updated: 03/04/2026, 18:18:51 UTC

Technical Analysis

CVE-2025-70220 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-513 router firmware version 1.10. The vulnerability resides in the handling of the curTime parameter within the goform/formAutoDetecWAN_wizard4 endpoint, which is part of the router’s web-based management interface. A stack buffer overflow occurs when the input data exceeds the allocated buffer size on the stack, potentially overwriting adjacent memory and allowing an attacker to execute arbitrary code or crash the device. This vulnerability can be triggered remotely by sending a specially crafted HTTP request to the vulnerable endpoint, without requiring authentication or user interaction. The absence of a CVSS score and public exploit code suggests this is a newly disclosed vulnerability with limited public analysis. However, the nature of stack buffer overflows typically allows attackers to gain control over the device’s execution flow, leading to full compromise or denial of service. The D-Link DIR-513 is a consumer-grade wireless router commonly deployed in home and small office networks, making this vulnerability relevant for a broad user base. No patches or mitigation instructions have been officially released at the time of publication, increasing the urgency for affected users to implement interim protective measures. The vulnerability was reserved in early 2026 and published shortly thereafter, indicating recent discovery and disclosure.

Potential Impact

The primary impact of CVE-2025-70220 is the potential for remote code execution on affected D-Link DIR-513 routers, which could allow attackers to take full control of the device. This compromises the confidentiality, integrity, and availability of the router and the network it protects. Attackers could intercept or manipulate network traffic, launch further attacks on internal systems, or disrupt internet connectivity by causing device crashes. Since the vulnerability does not require authentication, it can be exploited by any attacker with network access to the router’s management interface, increasing the attack surface. The widespread use of this router model in home and small office environments means many users could be exposed, especially if their devices are accessible from the internet or poorly segmented networks. The lack of available patches or mitigations at present means the risk remains unmitigated, potentially leading to increased exploitation attempts once exploit code becomes public. The impact extends beyond individual users to ISPs or organizations that provide these routers to customers, potentially affecting large numbers of endpoints.

Mitigation Recommendations

Until an official patch is released, affected users and organizations should take specific steps to reduce risk. First, restrict access to the router’s web management interface by disabling remote management or limiting it to trusted IP addresses only. Change default credentials to strong, unique passwords to prevent unauthorized access. Network segmentation should be implemented to isolate the router’s management interface from untrusted networks, including guest Wi-Fi and the internet. Monitor network traffic for unusual requests targeting the goform/formAutoDetecWAN_wizard4 endpoint or abnormal behavior indicative of exploitation attempts. Consider temporarily replacing the affected router with a different model or vendor if possible, especially in high-risk environments. Stay informed via D-Link’s official channels for firmware updates or security advisories addressing this vulnerability. If feasible, employ intrusion detection/prevention systems capable of detecting buffer overflow attack patterns targeting HTTP endpoints. Finally, educate users about the risks of exposing router management interfaces and the importance of timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a87779d1a09e29cb54d2e7

Added to database: 3/4/2026, 6:18:33 PM

Last enriched: 3/4/2026, 6:18:51 PM

Last updated: 3/5/2026, 3:25:13 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses