CVE-2025-70236: n/a
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDomainFilter.
AI Analysis
Technical Summary
The CVE-2025-70236 vulnerability is a stack-based buffer overflow in the D-Link DIR-513 router firmware version 1.10. The flaw exists in the handling of the curTime parameter within the goform/formSetDomainFilter endpoint, which is part of the router's web management interface. When an attacker sends a specially crafted HTTP request containing an oversized or malformed curTime parameter, it causes a stack buffer overflow. This overflow can overwrite adjacent memory on the stack, potentially allowing arbitrary code execution or causing the router to crash (denial of service). The vulnerability is remotely exploitable without authentication, assuming the attacker can reach the router's management interface, typically accessible on the local network or remotely if remote management is enabled. No CVSS score has been assigned yet, and no patches or official mitigations have been published. The lack of known exploits in the wild suggests it is either newly discovered or not yet weaponized. However, stack buffer overflows are a well-understood and severe class of vulnerabilities that can lead to full device compromise. The affected device, D-Link DIR-513, is a consumer-grade wireless router commonly used in home and small office environments. Given the critical role routers play in network traffic routing and security, exploitation could allow attackers to intercept, modify, or disrupt network communications. The vulnerability highlights the importance of secure input validation and memory management in embedded device firmware.
Potential Impact
If exploited, this vulnerability could allow attackers to execute arbitrary code on the affected router, leading to full compromise of the device. This could enable attackers to manipulate network traffic, install persistent malware, intercept sensitive data, or disrupt internet connectivity through denial of service. The compromise of a router also undermines the security of all devices behind it, potentially exposing internal networks to further attacks. Since the vulnerability does not require authentication, any attacker with network access to the router's management interface could attempt exploitation. This increases the risk in environments where remote management is enabled or where attackers have gained local network access. The impact extends beyond individual users to small businesses and organizations relying on this router model, potentially affecting confidentiality, integrity, and availability of network communications.
Mitigation Recommendations
1. Immediately disable remote management interfaces on the D-Link DIR-513 router to reduce exposure to remote attackers. 2. Restrict access to the router's web management interface to trusted local networks only, using network segmentation and firewall rules. 3. Monitor official D-Link channels for firmware updates addressing this vulnerability and apply patches promptly once available. 4. As a temporary measure, consider replacing affected routers with models from vendors with active security support if patching is delayed. 5. Implement network intrusion detection systems to identify anomalous traffic patterns targeting router management endpoints. 6. Educate users to avoid exposing router management interfaces to the internet and to use strong administrative passwords. 7. For organizations, conduct regular network audits to identify devices running vulnerable firmware versions and isolate or upgrade them accordingly.
Affected Countries
United States, Germany, United Kingdom, France, Australia, Canada, Japan, South Korea, Brazil, India
CVE-2025-70236: n/a
Description
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDomainFilter.
AI-Powered Analysis
Technical Analysis
The CVE-2025-70236 vulnerability is a stack-based buffer overflow in the D-Link DIR-513 router firmware version 1.10. The flaw exists in the handling of the curTime parameter within the goform/formSetDomainFilter endpoint, which is part of the router's web management interface. When an attacker sends a specially crafted HTTP request containing an oversized or malformed curTime parameter, it causes a stack buffer overflow. This overflow can overwrite adjacent memory on the stack, potentially allowing arbitrary code execution or causing the router to crash (denial of service). The vulnerability is remotely exploitable without authentication, assuming the attacker can reach the router's management interface, typically accessible on the local network or remotely if remote management is enabled. No CVSS score has been assigned yet, and no patches or official mitigations have been published. The lack of known exploits in the wild suggests it is either newly discovered or not yet weaponized. However, stack buffer overflows are a well-understood and severe class of vulnerabilities that can lead to full device compromise. The affected device, D-Link DIR-513, is a consumer-grade wireless router commonly used in home and small office environments. Given the critical role routers play in network traffic routing and security, exploitation could allow attackers to intercept, modify, or disrupt network communications. The vulnerability highlights the importance of secure input validation and memory management in embedded device firmware.
Potential Impact
If exploited, this vulnerability could allow attackers to execute arbitrary code on the affected router, leading to full compromise of the device. This could enable attackers to manipulate network traffic, install persistent malware, intercept sensitive data, or disrupt internet connectivity through denial of service. The compromise of a router also undermines the security of all devices behind it, potentially exposing internal networks to further attacks. Since the vulnerability does not require authentication, any attacker with network access to the router's management interface could attempt exploitation. This increases the risk in environments where remote management is enabled or where attackers have gained local network access. The impact extends beyond individual users to small businesses and organizations relying on this router model, potentially affecting confidentiality, integrity, and availability of network communications.
Mitigation Recommendations
1. Immediately disable remote management interfaces on the D-Link DIR-513 router to reduce exposure to remote attackers. 2. Restrict access to the router's web management interface to trusted local networks only, using network segmentation and firewall rules. 3. Monitor official D-Link channels for firmware updates addressing this vulnerability and apply patches promptly once available. 4. As a temporary measure, consider replacing affected routers with models from vendors with active security support if patching is delayed. 5. Implement network intrusion detection systems to identify anomalous traffic patterns targeting router management endpoints. 6. Educate users to avoid exposing router management interfaces to the internet and to use strong administrative passwords. 7. For organizations, conduct regular network audits to identify devices running vulnerable firmware versions and isolate or upgrade them accordingly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69a733fdd1a09e29cb7091b7
Added to database: 3/3/2026, 7:18:21 PM
Last enriched: 3/3/2026, 7:32:41 PM
Last updated: 3/4/2026, 7:11:03 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2732: CWE-862 Missing Authorization in shortpixel Enable Media Replace
MediumCVE-2026-2363: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in cbutlerjr WP-Members Membership Plugin
MediumCVE-2026-2025: CWE-200 Information Exposure in Mail Mint
HighCVE-2026-27012: CWE-306: Missing Authentication for Critical Function in devcode-it openstamanager
CriticalCVE-2026-28289: CWE-434: Unrestricted Upload of File with Dangerous Type in freescout-help-desk freescout
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.