CVE-2025-7910: Stack-based Buffer Overflow in D-Link DIR-513
A vulnerability classified as critical has been found in D-Link DIR-513 1.10. This affects the function sprintf of the file /goform/formSetWanNonLogin of the component Boa Webserver. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-7910 is a critical security vulnerability identified in the D-Link DIR-513 router, specifically version 1.10. The flaw resides in the Boa Webserver component, within the /goform/formSetWanNonLogin endpoint, where the sprintf function improperly handles the 'curTime' argument. This improper handling leads to a stack-based buffer overflow, a condition where more data is written to a buffer than it can hold, overwriting adjacent memory. This vulnerability is exploitable remotely without requiring user interaction or authentication, making it highly dangerous. An attacker can craft a malicious request to the vulnerable endpoint, triggering the overflow and potentially executing arbitrary code with elevated privileges on the device. Although the product is no longer supported by D-Link, the exploit details have been publicly disclosed, increasing the risk of exploitation by threat actors. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The lack of vendor support means no official patches or updates are available, leaving devices exposed unless mitigated by other means.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those still using legacy D-Link DIR-513 routers in their network infrastructure. Exploitation could lead to full compromise of the affected router, allowing attackers to intercept, modify, or disrupt network traffic, potentially leading to data breaches, espionage, or denial of service. This is particularly critical for small and medium enterprises or branch offices that may rely on older hardware due to budget constraints. The compromise of network perimeter devices can also serve as a pivot point for further attacks within the internal network, threatening sensitive corporate data and operational continuity. Given the public disclosure of the exploit and the absence of vendor patches, the risk of automated attacks or inclusion in botnets is elevated. Additionally, critical infrastructure operators or organizations in regulated sectors using these devices may face compliance and reputational risks if exploited.
Mitigation Recommendations
Since the affected product is no longer supported and no official patches exist, European organizations should prioritize the following mitigations: 1) Immediate replacement of the D-Link DIR-513 routers with supported, updated hardware that receives security patches. 2) If replacement is not immediately feasible, isolate the vulnerable devices from the internet and restrict access to trusted management networks only, using network segmentation and firewall rules. 3) Employ intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting the /goform/formSetWanNonLogin endpoint or unusual patterns indicative of buffer overflow exploitation attempts. 4) Regularly audit network devices to identify legacy hardware and maintain an up-to-date asset inventory. 5) Educate IT staff about this specific vulnerability and encourage vigilance for signs of compromise. 6) Consider deploying network-level mitigations such as Web Application Firewalls (WAFs) that can detect and block exploit attempts against known vulnerable endpoints. 7) Implement strict network access controls and VPNs for remote management to reduce exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-7910: Stack-based Buffer Overflow in D-Link DIR-513
Description
A vulnerability classified as critical has been found in D-Link DIR-513 1.10. This affects the function sprintf of the file /goform/formSetWanNonLogin of the component Boa Webserver. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-7910 is a critical security vulnerability identified in the D-Link DIR-513 router, specifically version 1.10. The flaw resides in the Boa Webserver component, within the /goform/formSetWanNonLogin endpoint, where the sprintf function improperly handles the 'curTime' argument. This improper handling leads to a stack-based buffer overflow, a condition where more data is written to a buffer than it can hold, overwriting adjacent memory. This vulnerability is exploitable remotely without requiring user interaction or authentication, making it highly dangerous. An attacker can craft a malicious request to the vulnerable endpoint, triggering the overflow and potentially executing arbitrary code with elevated privileges on the device. Although the product is no longer supported by D-Link, the exploit details have been publicly disclosed, increasing the risk of exploitation by threat actors. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The lack of vendor support means no official patches or updates are available, leaving devices exposed unless mitigated by other means.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those still using legacy D-Link DIR-513 routers in their network infrastructure. Exploitation could lead to full compromise of the affected router, allowing attackers to intercept, modify, or disrupt network traffic, potentially leading to data breaches, espionage, or denial of service. This is particularly critical for small and medium enterprises or branch offices that may rely on older hardware due to budget constraints. The compromise of network perimeter devices can also serve as a pivot point for further attacks within the internal network, threatening sensitive corporate data and operational continuity. Given the public disclosure of the exploit and the absence of vendor patches, the risk of automated attacks or inclusion in botnets is elevated. Additionally, critical infrastructure operators or organizations in regulated sectors using these devices may face compliance and reputational risks if exploited.
Mitigation Recommendations
Since the affected product is no longer supported and no official patches exist, European organizations should prioritize the following mitigations: 1) Immediate replacement of the D-Link DIR-513 routers with supported, updated hardware that receives security patches. 2) If replacement is not immediately feasible, isolate the vulnerable devices from the internet and restrict access to trusted management networks only, using network segmentation and firewall rules. 3) Employ intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting the /goform/formSetWanNonLogin endpoint or unusual patterns indicative of buffer overflow exploitation attempts. 4) Regularly audit network devices to identify legacy hardware and maintain an up-to-date asset inventory. 5) Educate IT staff about this specific vulnerability and encourage vigilance for signs of compromise. 6) Consider deploying network-level mitigations such as Web Application Firewalls (WAFs) that can detect and block exploit attempts against known vulnerable endpoints. 7) Implement strict network access controls and VPNs for remote management to reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-19T18:52:26.334Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687d6aa6a83201eaac050721
Added to database: 7/20/2025, 10:16:06 PM
Last enriched: 7/20/2025, 10:31:07 PM
Last updated: 7/20/2025, 10:31:07 PM
Views: 2
Related Threats
CVE-2025-7920: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Simopro Technology WinMatrix3 Web package
MediumCVE-2025-0664: CWE-94 Improper Control of Generation of Code ('Code Injection') in Trellix Trellix Endpoint Security (HX) Agent
MediumCVE-2025-7344: CWE-648 Incorrect Use of Privileged APIs in Digiwin EAI
HighCVE-2025-7343: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Digiwin SFT
CriticalCVE-2025-7919: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Simopro Technology WinMatrix3 Web package
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.