Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.8
D-Link DIR-513 Router Reboot Command Injection
CVE-2025-70219
Summary
An attacker can send a malicious reboot request to the DIR-513 router, potentially causing it to crash or execute unauthorized commands. This affects all DIR-513 routers running firmware version 1.10. Users should update to the latest firmware to prevent unauthorized access and system crashes.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dir-513_firmware | 1.10 | – |
Original title
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the goform/formDeviceReboot.
Original description
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the goform/formDeviceReboot.
nvd CVSS3.1
9.8
Vulnerability type
CWE-121
Stack-based Buffer Overflow
- https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70219 Exploit Third Party Advisory
- https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513 Product
- https://www.dlink.com/en/security-bulletin/ Vendor Advisory
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026