Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70240: n/a

0
Unknown
VulnerabilityCVE-2025-70240cvecve-2025-70240
Published: Tue Mar 03 2026 (03/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard51.

AI-Powered Analysis

AILast updated: 03/03/2026, 20:47:39 UTC

Technical Analysis

CVE-2025-70240 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-513 router, specifically in firmware version 1.10. The vulnerability is triggered by sending a maliciously crafted HTTP request to the goform/formSetWAN_Wizard51 endpoint, exploiting the curTime parameter. This parameter is improperly handled, allowing an attacker to overflow the stack buffer. Buffer overflows of this nature can lead to arbitrary code execution, enabling attackers to run malicious code with the privileges of the router's firmware process. Alternatively, exploitation could cause the device to crash, resulting in a denial of service. The vulnerability does not require authentication or user interaction, making it exploitable remotely by unauthenticated attackers. Although no known exploits have been reported in the wild, the lack of patches and the critical nature of the flaw pose a significant risk. The D-Link DIR-513 is a consumer-grade wireless router commonly used in home and small office environments, which may serve as a pivot point for attackers to infiltrate internal networks. The absence of a CVSS score necessitates an expert severity assessment based on the vulnerability's characteristics.

Potential Impact

The potential impact of CVE-2025-70240 is substantial for organizations and individuals using the affected D-Link DIR-513 router. Successful exploitation could allow attackers to execute arbitrary code on the device, leading to full compromise of the router. This can result in interception or manipulation of network traffic, unauthorized access to internal networks, and disruption of internet connectivity through denial of service. For businesses, especially small offices relying on this router, the vulnerability could expose sensitive data and critical systems to further attacks. The lack of authentication requirements and remote exploitability increase the attack surface, making widespread exploitation feasible if weaponized. Additionally, compromised routers can be enlisted into botnets or used as launch points for lateral movement within corporate networks. The absence of patches and public exploits currently limits immediate impact but also means the vulnerability remains a latent threat.

Mitigation Recommendations

To mitigate CVE-2025-70240 effectively, organizations and users should first restrict access to the router’s management interface by disabling remote administration and limiting local network access to trusted devices only. Network segmentation should be implemented to isolate vulnerable routers from critical systems. Monitoring network traffic for unusual HTTP requests targeting the goform/formSetWAN_Wizard51 endpoint can help detect exploitation attempts. Employing intrusion detection or prevention systems with custom signatures for this vulnerability is advisable. Users should regularly check for firmware updates from D-Link and apply any patches as soon as they become available. If no official patch is released promptly, consider replacing the affected hardware with a more secure, updated router model. Additionally, enforcing strong network security policies, including regular password changes and disabling unnecessary services on the router, will reduce risk. Finally, educating users about the risks of exposing router management interfaces to the internet is critical.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a74590d1a09e29cb76d1a0

Added to database: 3/3/2026, 8:33:20 PM

Last enriched: 3/3/2026, 8:47:39 PM

Last updated: 3/4/2026, 7:14:53 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses