CVE-2025-70223:
Stack buffer overflow in D-Link DIR-513 v1.10 router.
Score
A numerical rating that indicates how dangerous this vulnerability is.
9.8Critical- Published Date:Mar 4, 2026
- CISA KEV Date:*No Data*
- Industries Affected:20
Exploitability
- Score:3.9
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.9
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
Stack buffer overflow in D-Link DIR-513 v1.10 router.
Overview
The D-Link DIR-513 v1.10 router contains a critical stack buffer overflow vulnerability (CVE-2025-70223) that can be exploited remotely without authentication. The flaw exists in the handling of the curTime parameter within the goform/formAdvNetwork function. This vulnerability has been assigned a CVSS v3.1 base score of 9.8, indicating a critical severity level. The attack vector is network-based, with low attack complexity and no privileges or user interaction required. Successful exploitation could lead to complete compromise of the system's confidentiality, integrity, and availability.
Remediation
- As of the vulnerability's publication date, no official patch or firmware update has been released by D-Link to address this specific issue. Users of the affected D-Link DIR-513 router should take the following precautions:
- Monitor D-Link's security bulletin page for updates and patch releases.
- Implement strong network segmentation to isolate vulnerable devices.
- Restrict remote access to the router's management interface.
- Regularly check for and apply firmware updates when available.
- Consider replacing the affected device with a more secure alternative if patches are not forthcoming.
References
- [1] GitHub. "CVEreport: D-link/CVE-2025-70223". https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70223
- [2] D-Link. "DIR-513 Product Information". https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513
- [3] D-Link. "Security Bulletin". https://www.dlink.com/en/security-bulletin/
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.