Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.8
D-Link DIR-513 Router WAN Configuration Overflow
CVE-2025-70241
Summary
A bug in the D-Link DIR-513 router's WAN settings can allow an attacker to cause the router to crash or behave unexpectedly. This can happen if a hacker sends a specially crafted request to the router's configuration page. To protect your router, update to the latest firmware version as soon as possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dir-513_firmware | 1.10 | – |
Original title
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWANType_Wizard5.
Original description
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWANType_Wizard5.
nvd CVSS3.1
9.8
Vulnerability type
CWE-787
Out-of-bounds Write
CWE-121
Stack-based Buffer Overflow
- https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70241 Exploit Third Party Advisory
- https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513 Product
- https://www.dlink.com/en/security-bulletin/ Vendor Advisory
Published: 3 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026