Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.8
D-Link DIR-513 Router Allows Unauthorized Configuration Changes
CVE-2025-70225
Summary
A security issue in some older D-Link DIR-513 routers can be exploited by an attacker to potentially change the router's settings without permission. This could lead to unauthorized access or changes to the router's configuration. Users should update their router's firmware to the latest version to protect against this vulnerability.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dir-513_firmware | 1.10 | – |
Original title
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curtime parameter to the goform/formEasySetupWWConfig component
Original description
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curtime parameter to the goform/formEasySetupWWConfig component
nvd CVSS3.1
9.8
Vulnerability type
CWE-121
Stack-based Buffer Overflow
- https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70225 Exploit Third Party Advisory
- https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513 Product
- https://www.dlink.com/en/security-bulletin/ Vendor Advisory
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026