Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70247: n/a

0
High
VulnerabilityCVE-2025-70247cvecve-2025-70247
Published: Tue Mar 10 2026 (03/10/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWizard1.

AI-Powered Analysis

AILast updated: 03/10/2026, 20:15:02 UTC

Technical Analysis

CVE-2025-70247 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-513 router, firmware version 1.10. The flaw is triggered via the curTime parameter in the goform/formSetWizard1 endpoint, which is part of the router's web management interface. A stack buffer overflow occurs when input data exceeds the allocated buffer size on the stack, overwriting adjacent memory and potentially allowing an attacker to execute arbitrary code or crash the device. This vulnerability is critical because it can be exploited remotely without authentication if the attacker has network access to the router's management interface, commonly exposed on local networks or potentially via remote management if enabled. The absence of a CVSS score and public exploit code suggests this is a recently disclosed vulnerability with limited public exploitation knowledge. However, the technical nature of stack buffer overflows typically allows skilled attackers to develop exploits that can lead to full device compromise. The D-Link DIR-513 is a consumer-grade wireless router widely used in various regions, making this vulnerability relevant for home users and small businesses relying on this hardware. The lack of available patches or mitigation guidance from the vendor increases the urgency for defensive measures to prevent exploitation.

Potential Impact

The exploitation of this stack buffer overflow could have severe consequences for affected organizations and users. Successful attacks may result in arbitrary code execution on the router, allowing attackers to gain control over the device. This control can be leveraged to intercept or manipulate network traffic, launch further attacks within the local network, or disrupt network availability through denial of service. Confidentiality is at risk as attackers could capture sensitive data passing through the router. Integrity could be compromised by altering router configurations or injecting malicious payloads. Availability may be impacted if the device crashes or is rendered inoperable. Small businesses and home users relying on the DIR-513 for network connectivity are particularly vulnerable, as they often lack advanced security monitoring. The absence of known exploits currently limits immediate widespread impact, but the vulnerability’s nature means it could be weaponized in targeted attacks or automated scanning campaigns once exploit code becomes available.

Mitigation Recommendations

To mitigate the risk posed by CVE-2025-70247, organizations and users should take the following specific actions: 1) Immediately restrict access to the router’s web management interface by disabling remote management features and limiting access to trusted IP addresses or VLANs. 2) Change default credentials to strong, unique passwords to prevent unauthorized access. 3) Monitor network traffic for unusual requests targeting the goform/formSetWizard1 endpoint or suspicious activity indicative of buffer overflow attempts. 4) Isolate the affected router from critical network segments until a patch is available. 5) Regularly check for firmware updates from D-Link and apply them promptly once released. 6) Consider replacing the DIR-513 router with a more secure and actively supported device if patching is delayed or unavailable. 7) Employ network intrusion detection systems (NIDS) capable of detecting buffer overflow exploit patterns. 8) Educate users about the risks of exposing router management interfaces to untrusted networks. These measures go beyond generic advice by focusing on access control, monitoring, and proactive replacement strategies tailored to this specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b078412f860ef943afd335

Added to database: 3/10/2026, 8:00:01 PM

Last enriched: 3/10/2026, 8:15:02 PM

Last updated: 3/14/2026, 2:36:04 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses