CVE-2025-70233
Published: 05 March 2026
Description
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetEnableWizard.
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely remediation of flaws such as this stack buffer overflow vulnerability through patching or upgrades as advised in D-Link's security bulletin.
Requires validation of untrusted inputs like the curTime parameter to the goform/formSetEnableWizard endpoint, preventing the stack buffer overflow exploitation.
Implements memory protection mechanisms such as stack canaries and address space layout randomization to mitigate stack buffer overflow exploits leading to arbitrary code execution.
Security SummaryAI
CVE-2025-70233 is a stack buffer overflow vulnerability (CWE-121) in D-Link DIR-513 router version 1.10. The flaw occurs via the curTime parameter sent to the goform/formSetEnableWizard endpoint. Published on 2026-03-05, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
A remote, unauthenticated attacker can exploit this vulnerability with low complexity and no user interaction required. Exploitation targets the router's web interface over the network, potentially enabling full compromise including high confidentiality, integrity, and availability impacts such as arbitrary code execution on the device.
D-Link provides relevant mitigation guidance through its security bulletin page at https://www.dlink.com/en/security-bulletin/ and the DIR-513 product support page at https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513. Further technical details on the vulnerability are documented in the GitHub repository https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70233.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack buffer overflow in the web interface of a public-facing router enables remote unauthenticated arbitrary code execution, directly facilitating T1190: Exploit Public-Facing Application.