Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70234: n/a

0
Unknown
VulnerabilityCVE-2025-70234cvecve-2025-70234
Published: Tue Mar 03 2026 (03/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetQoS.

AI-Powered Analysis

AILast updated: 03/03/2026, 21:03:12 UTC

Technical Analysis

CVE-2025-70234 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-513 router firmware version 1.10. The vulnerability is triggered by sending a maliciously crafted HTTP request to the goform/formSetQoS endpoint, specifically manipulating the curTime parameter. The flaw arises because the input is not properly validated or bounds-checked before being copied into a fixed-size stack buffer, allowing an attacker to overwrite adjacent memory on the stack. This can lead to control of the instruction pointer, enabling arbitrary code execution or causing a denial of service through device crashes. The vulnerability is significant because the affected endpoint is part of the router's Quality of Service (QoS) configuration interface, which is typically accessible via the device's web management interface. Exploitation likely requires network access to the router's management interface but does not require authentication, increasing the attack surface. No official patches or mitigations have been published yet, and no known exploits are currently in the wild. The vulnerability was reserved in January 2026 and published in March 2026, indicating recent discovery. The lack of a CVSS score means severity must be inferred from the technical details and potential impact. Buffer overflows in network devices are critical because they can allow attackers to gain persistent control over the device, disrupt network traffic, or pivot to internal networks.

Potential Impact

The impact of CVE-2025-70234 can be severe for organizations and individuals using the D-Link DIR-513 router. Successful exploitation could allow attackers to execute arbitrary code with elevated privileges on the device, potentially leading to full compromise of the router. This could enable attackers to intercept, modify, or redirect network traffic, degrade network performance, or launch further attacks against internal network resources. The vulnerability could also be leveraged to cause denial of service by crashing the router, disrupting internet connectivity. Since the router is commonly used in home and small office environments, the attack surface includes many less-secured networks, increasing the risk of widespread exploitation. The absence of authentication requirements for exploitation further exacerbates the risk, as attackers can attempt to exploit the vulnerability remotely if the management interface is exposed. This could lead to data breaches, loss of network availability, and compromise of connected devices. Organizations relying on this router model should consider the risk to their network perimeter and internal security posture.

Mitigation Recommendations

To mitigate CVE-2025-70234, organizations and users should immediately restrict access to the router's management interface by disabling remote management or limiting it to trusted IP addresses. Network segmentation should be employed to isolate the router management interface from untrusted networks. Monitoring network traffic for unusual HTTP requests targeting the goform/formSetQoS endpoint can help detect exploitation attempts. Until an official patch is released by D-Link, consider replacing the affected router with a more secure model or firmware version not vulnerable to this issue. Applying network-level protections such as firewall rules to block unauthorized access to the router's web interface is critical. Users should also regularly check for firmware updates from D-Link and apply them promptly once available. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for buffer overflow attempts targeting this router model can provide additional defense. Finally, educating users about the risks of exposing router management interfaces to the internet can reduce inadvertent exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a74916d1a09e29cb78e8d8

Added to database: 3/3/2026, 8:48:22 PM

Last enriched: 3/3/2026, 9:03:12 PM

Last updated: 3/4/2026, 6:37:24 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses