Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70236: n/a

0
Unknown
VulnerabilityCVE-2025-70236cvecve-2025-70236
Published: Tue Mar 03 2026 (03/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDomainFilter.

AI-Powered Analysis

AILast updated: 03/03/2026, 19:32:41 UTC

Technical Analysis

The CVE-2025-70236 vulnerability is a stack-based buffer overflow in the D-Link DIR-513 router firmware version 1.10. The flaw exists in the handling of the curTime parameter within the goform/formSetDomainFilter endpoint, which is part of the router's web management interface. When an attacker sends a specially crafted HTTP request containing an oversized or malformed curTime parameter, it causes a stack buffer overflow. This overflow can overwrite adjacent memory on the stack, potentially allowing arbitrary code execution or causing the router to crash (denial of service). The vulnerability is remotely exploitable without authentication, assuming the attacker can reach the router's management interface, typically accessible on the local network or remotely if remote management is enabled. No CVSS score has been assigned yet, and no patches or official mitigations have been published. The lack of known exploits in the wild suggests it is either newly discovered or not yet weaponized. However, stack buffer overflows are a well-understood and severe class of vulnerabilities that can lead to full device compromise. The affected device, D-Link DIR-513, is a consumer-grade wireless router commonly used in home and small office environments. Given the critical role routers play in network traffic routing and security, exploitation could allow attackers to intercept, modify, or disrupt network communications. The vulnerability highlights the importance of secure input validation and memory management in embedded device firmware.

Potential Impact

If exploited, this vulnerability could allow attackers to execute arbitrary code on the affected router, leading to full compromise of the device. This could enable attackers to manipulate network traffic, install persistent malware, intercept sensitive data, or disrupt internet connectivity through denial of service. The compromise of a router also undermines the security of all devices behind it, potentially exposing internal networks to further attacks. Since the vulnerability does not require authentication, any attacker with network access to the router's management interface could attempt exploitation. This increases the risk in environments where remote management is enabled or where attackers have gained local network access. The impact extends beyond individual users to small businesses and organizations relying on this router model, potentially affecting confidentiality, integrity, and availability of network communications.

Mitigation Recommendations

1. Immediately disable remote management interfaces on the D-Link DIR-513 router to reduce exposure to remote attackers. 2. Restrict access to the router's web management interface to trusted local networks only, using network segmentation and firewall rules. 3. Monitor official D-Link channels for firmware updates addressing this vulnerability and apply patches promptly once available. 4. As a temporary measure, consider replacing affected routers with models from vendors with active security support if patching is delayed. 5. Implement network intrusion detection systems to identify anomalous traffic patterns targeting router management endpoints. 6. Educate users to avoid exposing router management interfaces to the internet and to use strong administrative passwords. 7. For organizations, conduct regular network audits to identify devices running vulnerable firmware versions and isolate or upgrade them accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a733fdd1a09e29cb7091b7

Added to database: 3/3/2026, 7:18:21 PM

Last enriched: 3/3/2026, 7:32:41 PM

Last updated: 3/4/2026, 7:11:03 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses