Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70229: n/a

0
Unknown
VulnerabilityCVE-2025-70229cvecve-2025-70229
Published: Thu Mar 05 2026 (03/05/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSchedule.

AI-Powered Analysis

AILast updated: 03/05/2026, 18:38:33 UTC

Technical Analysis

CVE-2025-70229 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-513 router, specifically in firmware version 1.10. The vulnerability arises from improper handling of the curTime parameter submitted to the goform/formSchedule endpoint. When a specially crafted request is sent to this endpoint, it can overflow the stack buffer, potentially allowing an attacker to overwrite the return address or other control data on the stack. This can lead to arbitrary code execution with the privileges of the affected process, which typically runs with elevated permissions on the router. The vulnerability does not require authentication or user interaction, making it more dangerous if the device is exposed to untrusted networks. No CVSS score has been assigned yet, and no patches or known exploits are publicly available. However, the technical nature of the flaw indicates a high risk of exploitation once weaponized. The router model affected is used in various regions worldwide, primarily in home and small office environments, which could be targeted for network infiltration or as a foothold for further attacks. The lack of a patch and public exploit means defenders must rely on network controls and monitoring until a firmware update is issued.

Potential Impact

The exploitation of this buffer overflow vulnerability could have severe consequences for affected organizations. Successful exploitation may allow attackers to execute arbitrary code on the router, leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, and disruption of network availability. Confidentiality and integrity of data passing through the router could be compromised. For organizations relying on these routers in critical network segments, this could lead to lateral movement by attackers, data breaches, or denial of service conditions. The vulnerability's ease of exploitation, given no authentication or user interaction is required, increases the risk profile. The impact extends to both home users and small businesses, but also to larger organizations if these devices are deployed in branch offices or remote sites. The absence of known exploits currently limits immediate risk but also means attackers may develop exploits in the future, increasing potential impact.

Mitigation Recommendations

Until an official patch is released by D-Link, organizations should implement several specific mitigations. First, restrict access to the router’s management interface by limiting it to trusted internal networks and disabling remote management features. Employ network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data. Monitor network traffic for unusual or malformed requests targeting the goform/formSchedule endpoint, which may indicate exploitation attempts. Use intrusion detection or prevention systems with custom signatures to detect buffer overflow attack patterns. Regularly check for firmware updates from D-Link and apply them promptly once available. Consider replacing affected devices with newer models that have updated security features if patching is delayed. Additionally, enforce strong network security policies and educate users about the risks of exposing network devices to the internet. Backup router configurations and maintain incident response plans to quickly address potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a9c994460e1c85df13931f

Added to database: 3/5/2026, 6:21:08 PM

Last enriched: 3/5/2026, 6:38:33 PM

Last updated: 3/5/2026, 10:43:44 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses