CVE-2025-70250: n/a
CVE-2025-70250 is a stack buffer overflow vulnerability found in the D-Link DIR-513 router firmware version 1. 10, triggered via the curTime parameter in the goform/formdumpeasysetup endpoint. This vulnerability allows remote attackers to cause a denial of service (DoS) by crashing the device without requiring authentication or user interaction. The flaw stems from improper bounds checking on input data, leading to memory corruption. Although no known exploits are currently in the wild, the vulnerability has a high CVSS score of 7. 5 due to its potential to disrupt device availability. No patches have been released yet, increasing the risk for affected users. Organizations relying on this router model should be aware of the risk and implement mitigations to prevent exploitation. The vulnerability primarily impacts home and small office environments using this specific D-Link model. Countries with significant deployment of D-Link networking equipment, especially in Asia, Europe, and North America, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2025-70250 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-513 router firmware version 1.10. The vulnerability is triggered by sending a specially crafted request to the goform/formdumpeasysetup endpoint, specifically manipulating the curTime parameter. This parameter is not properly validated, allowing an attacker to overflow the stack buffer, which can lead to memory corruption and ultimately cause the device to crash, resulting in a denial of service condition. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 3.1 base score of 7.5 reflects a high severity primarily due to the ease of exploitation (network vector, no privileges needed) and the impact on availability (device crash). However, confidentiality and integrity are not impacted by this flaw. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a common and critical software weakness. No patches or official fixes have been released at the time of publication, and no known exploits have been observed in the wild. The affected product, D-Link DIR-513, is a consumer-grade wireless router commonly used in home and small office environments. The lack of authentication requirement and the network accessibility of the vulnerable endpoint increase the risk profile. Organizations using this router model should consider immediate mitigations to reduce exposure until a firmware update is available.
Potential Impact
The primary impact of CVE-2025-70250 is a denial of service condition caused by remote exploitation of the stack buffer overflow, leading to router crashes and network outages. This can disrupt internet connectivity for home users and small businesses relying on the D-Link DIR-513 router, potentially affecting productivity and access to critical online services. Although the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can have cascading effects, including interruption of VoIP services, remote work capabilities, and IoT device connectivity. For organizations with limited IT support or those unaware of the vulnerability, prolonged downtime could result in operational disruptions. Additionally, attackers could leverage the DoS condition as part of a larger attack strategy, such as network reconnaissance or distraction during multi-stage intrusions. The absence of patches increases the window of exposure, and the ease of exploitation without authentication makes this a significant risk for affected users worldwide.
Mitigation Recommendations
1. Immediately disable remote management features on the D-Link DIR-513 router to reduce exposure to external attacks. 2. Restrict access to the router's management interface by implementing network segmentation and firewall rules that limit access to trusted IP addresses only. 3. Monitor router logs and network traffic for unusual activity or repeated requests to the goform/formdumpeasysetup endpoint, which may indicate exploitation attempts. 4. If possible, replace affected devices with newer models that have updated firmware and security patches. 5. Regularly check D-Link’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 6. Educate users about the risks of using outdated router firmware and encourage best practices for network device security. 7. Consider deploying network intrusion detection/prevention systems (IDS/IPS) that can detect and block malformed packets targeting this vulnerability. 8. For critical environments, implement redundant internet connectivity to mitigate the impact of potential router outages.
Affected Countries
United States, Canada, Germany, United Kingdom, France, Australia, Japan, South Korea, India, Brazil
CVE-2025-70250: n/a
Description
CVE-2025-70250 is a stack buffer overflow vulnerability found in the D-Link DIR-513 router firmware version 1. 10, triggered via the curTime parameter in the goform/formdumpeasysetup endpoint. This vulnerability allows remote attackers to cause a denial of service (DoS) by crashing the device without requiring authentication or user interaction. The flaw stems from improper bounds checking on input data, leading to memory corruption. Although no known exploits are currently in the wild, the vulnerability has a high CVSS score of 7. 5 due to its potential to disrupt device availability. No patches have been released yet, increasing the risk for affected users. Organizations relying on this router model should be aware of the risk and implement mitigations to prevent exploitation. The vulnerability primarily impacts home and small office environments using this specific D-Link model. Countries with significant deployment of D-Link networking equipment, especially in Asia, Europe, and North America, are most likely to be affected.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-70250 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-513 router firmware version 1.10. The vulnerability is triggered by sending a specially crafted request to the goform/formdumpeasysetup endpoint, specifically manipulating the curTime parameter. This parameter is not properly validated, allowing an attacker to overflow the stack buffer, which can lead to memory corruption and ultimately cause the device to crash, resulting in a denial of service condition. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 3.1 base score of 7.5 reflects a high severity primarily due to the ease of exploitation (network vector, no privileges needed) and the impact on availability (device crash). However, confidentiality and integrity are not impacted by this flaw. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a common and critical software weakness. No patches or official fixes have been released at the time of publication, and no known exploits have been observed in the wild. The affected product, D-Link DIR-513, is a consumer-grade wireless router commonly used in home and small office environments. The lack of authentication requirement and the network accessibility of the vulnerable endpoint increase the risk profile. Organizations using this router model should consider immediate mitigations to reduce exposure until a firmware update is available.
Potential Impact
The primary impact of CVE-2025-70250 is a denial of service condition caused by remote exploitation of the stack buffer overflow, leading to router crashes and network outages. This can disrupt internet connectivity for home users and small businesses relying on the D-Link DIR-513 router, potentially affecting productivity and access to critical online services. Although the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can have cascading effects, including interruption of VoIP services, remote work capabilities, and IoT device connectivity. For organizations with limited IT support or those unaware of the vulnerability, prolonged downtime could result in operational disruptions. Additionally, attackers could leverage the DoS condition as part of a larger attack strategy, such as network reconnaissance or distraction during multi-stage intrusions. The absence of patches increases the window of exposure, and the ease of exploitation without authentication makes this a significant risk for affected users worldwide.
Mitigation Recommendations
1. Immediately disable remote management features on the D-Link DIR-513 router to reduce exposure to external attacks. 2. Restrict access to the router's management interface by implementing network segmentation and firewall rules that limit access to trusted IP addresses only. 3. Monitor router logs and network traffic for unusual activity or repeated requests to the goform/formdumpeasysetup endpoint, which may indicate exploitation attempts. 4. If possible, replace affected devices with newer models that have updated firmware and security patches. 5. Regularly check D-Link’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 6. Educate users about the risks of using outdated router firmware and encourage best practices for network device security. 7. Consider deploying network intrusion detection/prevention systems (IDS/IPS) that can detect and block malformed packets targeting this vulnerability. 8. For critical environments, implement redundant internet connectivity to mitigate the impact of potential router outages.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69aedb362904315ca312a949
Added to database: 3/9/2026, 2:37:42 PM
Last enriched: 3/16/2026, 7:13:27 PM
Last updated: 4/23/2026, 2:02:11 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.