Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70243: n/a

0
Unknown
VulnerabilityCVE-2025-70243cvecve-2025-70243
Published: Mon Mar 09 2026 (03/09/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard534.

AI-Powered Analysis

AILast updated: 03/09/2026, 14:52:20 UTC

Technical Analysis

The vulnerability identified as CVE-2025-70243 is a stack-based buffer overflow affecting the D-Link DIR-513 router, version 1.10. The flaw resides in the handling of the curTime parameter within the goform/formSetWAN_Wizard534 endpoint, which is part of the router’s WAN setup wizard functionality. When an attacker sends a specially crafted HTTP request to this endpoint, the router fails to properly validate the length or content of the curTime parameter, leading to a stack buffer overflow. This overflow can corrupt adjacent memory, potentially allowing an attacker to execute arbitrary code with the privileges of the router’s firmware process or cause a denial of service by crashing the device. The vulnerability does not require prior authentication, meaning it can be exploited remotely by any attacker able to reach the router’s management interface, typically via the local network or, if remote management is enabled, from the internet. No patches or official fixes have been published yet, and no public exploits have been observed in the wild, but the nature of the vulnerability makes it a critical concern. The router model affected is commonly used in home and small office environments, where security controls may be limited, increasing the likelihood of exploitation. The absence of a CVSS score requires an assessment based on the vulnerability’s characteristics, which indicate a high severity due to the potential for full device compromise and network disruption.

Potential Impact

The exploitation of this stack buffer overflow can have severe consequences for organizations and individuals using the affected D-Link DIR-513 routers. Successful exploitation could allow attackers to execute arbitrary code on the router, potentially gaining control over the device’s firmware. This control could be leveraged to intercept, modify, or redirect network traffic, leading to data breaches, man-in-the-middle attacks, or network disruption. Additionally, attackers could use the compromised router as a foothold to launch further attacks within the internal network, escalating privileges or spreading malware. The denial of service impact could disrupt internet connectivity for affected users, impacting business operations and productivity. Given the router’s typical deployment in SOHO environments, the risk extends to small businesses and home users who may lack sophisticated security monitoring. The lack of authentication requirement and potential remote exploitability increase the threat’s scope and urgency. Organizations relying on these devices for critical connectivity should consider the vulnerability a significant risk to confidentiality, integrity, and availability of their network infrastructure.

Mitigation Recommendations

To mitigate the risk posed by CVE-2025-70243, organizations and users should take immediate steps beyond generic advice. First, disable remote management interfaces on the affected routers to prevent external exploitation. Restrict access to the router’s web management interface to trusted internal IP addresses only, using access control lists or firewall rules. Monitor network traffic for unusual HTTP requests targeting the goform/formSetWAN_Wizard534 endpoint, which may indicate exploitation attempts. If possible, segment the network to isolate the router management interface from general user traffic. Regularly back up router configurations to enable quick recovery if compromise occurs. Since no official patches are currently available, consider replacing affected devices with newer models that have updated firmware and security features. Engage with D-Link support channels to obtain information on upcoming patches or workarounds. Finally, educate users on the risks of enabling remote administration and the importance of strong router passwords to reduce the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69aedb362904315ca312a944

Added to database: 3/9/2026, 2:37:42 PM

Last enriched: 3/9/2026, 2:52:20 PM

Last updated: 3/9/2026, 4:27:27 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses