Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.8
D-Link DIR-513 v1.10 Allows Remote Execution via Malicious Firewall Settings
CVE-2025-70218
Summary
A security issue in the D-Link DIR-513 version 1.10 can be exploited by a remote attacker to potentially execute malicious code. This can happen when a specific request is made to the device. To stay safe, update to the latest firmware version if available.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dir-513_firmware | 1.10 | – |
Original title
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via POST to the goform/formAdvFirewall component.
Original description
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via POST to the goform/formAdvFirewall component.
nvd CVSS3.1
9.8
Vulnerability type
CWE-121
Stack-based Buffer Overflow
- https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70218 Exploit Third Party Advisory
- https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513 Product
- https://www.dlink.com/en/security-bulletin/ Vendor Advisory
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026