Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70233: n/a

0
Unknown
VulnerabilityCVE-2025-70233cvecve-2025-70233
Published: Thu Mar 05 2026 (03/05/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetEnableWizard.

AI-Powered Analysis

AILast updated: 03/05/2026, 18:37:33 UTC

Technical Analysis

CVE-2025-70233 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-513 router running firmware version 1.10. The vulnerability arises from improper input validation of the curTime parameter submitted to the goform/formSetEnableWizard endpoint. When an attacker sends a specially crafted request containing an oversized or malformed curTime parameter, it causes a buffer overflow on the stack, leading to memory corruption. This can potentially allow remote code execution (RCE) or cause the device to crash, resulting in denial of service (DoS). The flaw does not require prior authentication, meaning an attacker with network access to the router's management interface or exposed services could exploit it. No CVSS score has been assigned yet, and no patches or known exploits are publicly available at this time. The vulnerability was reserved in early 2026 and published shortly thereafter, indicating it is a recent discovery. The DIR-513 is a consumer-grade wireless router commonly used in home and small office environments, which increases the risk of widespread impact if exploited. The lack of authentication requirement and the critical nature of buffer overflows in embedded devices make this a significant security concern. Attackers exploiting this vulnerability could gain control over the router, intercept or manipulate network traffic, or disrupt network availability.

Potential Impact

The impact of CVE-2025-70233 is potentially severe for organizations and individuals using the D-Link DIR-513 router. Successful exploitation could lead to remote code execution, allowing attackers to take full control of the device. This could enable interception of sensitive data, manipulation of network traffic, or pivoting to other devices on the network. Additionally, exploitation could cause denial of service by crashing the router, disrupting internet connectivity and business operations. Given the router's typical deployment in home and small office environments, the vulnerability could expose a large number of users to compromise, especially where routers are directly accessible from the internet or poorly segmented networks. The absence of authentication requirements lowers the barrier for exploitation, increasing the risk. While no known exploits are currently in the wild, the vulnerability's nature and ease of exploitation make it a high-risk issue that could be leveraged by attackers once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2025-70233, affected users and organizations should take immediate steps to reduce exposure. First, restrict access to the router's management interface by disabling remote administration and limiting access to trusted internal networks only. Implement network segmentation to isolate the router from critical systems and sensitive data. Monitor network traffic for unusual or malformed requests targeting the goform/formSetEnableWizard endpoint. Since no official patch is currently available, users should regularly check D-Link's security advisories for firmware updates addressing this vulnerability and apply them promptly once released. As a temporary measure, consider replacing the affected router with a more secure model or deploying additional security controls such as network firewalls or intrusion prevention systems to block exploit attempts. Finally, educate users about the risks of exposing router management interfaces and encourage strong password policies to reduce the risk of further compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a9c994460e1c85df139333

Added to database: 3/5/2026, 6:21:08 PM

Last enriched: 3/5/2026, 6:37:33 PM

Last updated: 3/6/2026, 12:04:47 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses