Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70244: n/a

0
High
VulnerabilityCVE-2025-70244cvecve-2025-70244
Published: Tue Mar 10 2026 (03/10/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the webPage parameter to goform/formWlanSetup.

AI-Powered Analysis

AILast updated: 03/10/2026, 20:45:58 UTC

Technical Analysis

CVE-2025-70244 is a stack buffer overflow vulnerability identified in the D-Link DIR-513 router firmware version 1.10. The vulnerability resides in the handling of the webPage parameter within the goform/formWlanSetup endpoint, which is part of the router's web management interface. A stack buffer overflow occurs when the input to this parameter exceeds the allocated buffer size, leading to memory corruption. This can allow an attacker to overwrite the stack, potentially enabling arbitrary code execution or causing the router to crash, resulting in a denial of service. The vulnerability is exploitable remotely if the attacker can send crafted HTTP requests to the router's web interface. Since the web interface is often accessible only within the local network, exploitation typically requires network access or exposure of the management interface to the internet. No CVSS score has been assigned yet, and no patches or official mitigations have been published. The vulnerability affects a consumer-grade router model widely used in various regions, making it a significant risk for home users and small businesses. The absence of known exploits in the wild suggests it is either newly discovered or not yet weaponized. However, the potential impact of remote code execution on network infrastructure devices is severe, warranting immediate attention from users and administrators. The vulnerability highlights the importance of securing router management interfaces and applying firmware updates promptly once available.

Potential Impact

The potential impact of CVE-2025-70244 is significant for organizations and individuals using the affected D-Link DIR-513 router. Successful exploitation could allow attackers to execute arbitrary code on the device, leading to full compromise of the router. This can result in unauthorized network access, interception or manipulation of network traffic, and disruption of internet connectivity through denial of service. For small businesses and home users, this could mean exposure of sensitive data, interruption of business operations, and the router being used as a foothold for further attacks within the network. The vulnerability undermines the confidentiality, integrity, and availability of network communications. Since routers are critical network infrastructure components, their compromise can have cascading effects on connected devices and services. The lack of authentication requirements for exploitation (assuming the web interface is accessible) increases the risk. Although no exploits are currently known in the wild, the vulnerability's nature makes it a high-value target for attackers seeking to gain persistent access or disrupt networks. Organizations relying on this router model should consider the risk high until a patch is released and applied.

Mitigation Recommendations

To mitigate the risk posed by CVE-2025-70244, affected users and organizations should take several specific actions beyond generic advice: 1) Immediately restrict access to the router's web management interface by disabling remote management if enabled, or limiting access via firewall rules to trusted IP addresses only. 2) Segment the network to isolate the router management interface from general user networks, reducing exposure to potential attackers. 3) Monitor network traffic for unusual HTTP requests targeting the goform/formWlanSetup endpoint, which could indicate exploitation attempts. 4) Regularly check D-Link's official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 5) Consider replacing the affected router with a more secure model if firmware updates are not forthcoming or if the device is critical to network security. 6) Educate users about the risks of exposing router management interfaces and enforce strong administrative passwords. 7) Employ network intrusion detection systems capable of recognizing buffer overflow exploit patterns targeting embedded devices. These targeted mitigations will reduce the attack surface and limit the potential for successful exploitation until an official patch is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b07f3e2f860ef943b515a3

Added to database: 3/10/2026, 8:29:50 PM

Last enriched: 3/10/2026, 8:45:58 PM

Last updated: 3/10/2026, 9:55:45 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses