Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70245: n/a

0
High
VulnerabilityCVE-2025-70245cvecve-2025-70245
Published: Thu Mar 12 2026 (03/12/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWizardSelectMode.

AI-Powered Analysis

AILast updated: 03/12/2026, 21:14:43 UTC

Technical Analysis

CVE-2025-70245 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-513 router, specifically firmware version 1.10. The flaw is triggered by sending a maliciously crafted HTTP request to the router's web management interface, targeting the curTime parameter within the goform/formSetWizardSelectMode endpoint. This parameter is not properly bounds-checked, allowing an attacker to overwrite the stack memory. Such a buffer overflow can lead to arbitrary code execution, enabling an attacker to gain control over the device, or cause a denial of service by crashing the router. The vulnerability is notable because it does not require authentication, meaning an attacker with network access to the router's management interface can exploit it remotely. Although no public exploits or patches are currently available, the vulnerability poses a significant risk due to the widespread use of D-Link DIR-513 routers in home and small office environments. The lack of a CVSS score suggests this is a recently disclosed issue, and the absence of patches highlights the urgency for users to apply mitigations or consider alternative protections. The vulnerability could be leveraged to pivot into internal networks, intercept or manipulate traffic, or disrupt network availability.

Potential Impact

The impact of CVE-2025-70245 is potentially severe for organizations and individuals using the affected D-Link DIR-513 routers. Exploitation could allow attackers to execute arbitrary code on the device, leading to full compromise of the router. This can result in unauthorized access to internal networks, interception of sensitive data, manipulation of network traffic, and disruption of internet connectivity. For small businesses and home users relying on these routers, the vulnerability could lead to data breaches, loss of service, and further lateral movement by attackers into connected systems. Since the vulnerability does not require authentication, it increases the attack surface, especially in environments where router management interfaces are exposed or accessible from untrusted networks. The absence of known exploits currently limits immediate widespread impact, but the potential for future exploitation remains high. Organizations with large deployments of D-Link routers or those in sectors with high security requirements should consider this vulnerability critical to address.

Mitigation Recommendations

To mitigate CVE-2025-70245, organizations and users should first check for any firmware updates or security advisories from D-Link addressing this vulnerability and apply patches immediately once available. In the absence of official patches, users should restrict access to the router's management interface by disabling remote management features and limiting access to trusted internal networks only. Implement network segmentation to isolate vulnerable devices from critical systems. Employ firewall rules to block unauthorized traffic to the router's web interface, particularly on port 80 or 443 if used. Monitor network traffic for unusual activity that could indicate exploitation attempts. Consider replacing affected hardware with newer models that have active security support. Additionally, regularly backup router configurations and maintain an inventory of network devices to quickly identify and respond to potential compromises. Educate users about the risks of exposing router management interfaces to the internet and enforce strong administrative passwords.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b3294c2f860ef943f62dfe

Added to database: 3/12/2026, 8:59:56 PM

Last enriched: 3/12/2026, 9:14:43 PM

Last updated: 3/12/2026, 10:43:41 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses