Cyber Posture

CVE-2025-70231

CriticalPublic PoC

Published: 05 March 2026

Published
05 March 2026
Modified
06 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting in a path traversal vulnerability.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the path traversal vulnerability by requiring validation of the FILECODE parameter to reject traversal sequences like '../' and ensure only intended paths are processed.

prevent

Enforces logical access controls on files and directories, mitigating unauthorized reads or writes resulting from unfiltered path traversal in the /goform/getAuthCode endpoint.

prevent

Mandates identification, reporting, and timely patching of the specific flaw in D-Link DIR-513 v1.10 as detailed in vendor advisories, eliminating the vulnerability.

Security SummaryAI

CVE-2025-70231, published on 2026-03-05, is a critical path traversal vulnerability (CWE-22) in D-Link DIR-513 version 1.10. The flaw arises when the device processes POST requests related to verification codes via the /goform/formLogin endpoint, which forwards to /goform/getAuthCode without properly filtering the FILECODE parameter. This allows traversal outside intended directories. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote attackers can exploit this vulnerability over the network with low attack complexity, requiring no authentication privileges or user interaction. Exploitation enables high-impact compromise of confidentiality, integrity, and availability, potentially allowing arbitrary file read, write, or execution depending on the traversed paths.

Mitigation guidance and patches are referenced in vendor advisories, including D-Link's security bulletin at https://www.dlink.com/en/security-bulletin/, product support page at https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513, and a detailed report at https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70231.

Details

CWE(s)

Affected Products

dlink
dir-513 firmware
1.10

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Path traversal vulnerability in public-facing web endpoint of D-Link router enables remote unauthenticated exploitation of public-facing application (T1190), potentially allowing arbitrary file read/write/execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References