CVE-2025-70225
Published: 04 March 2026
Summary
CVE-2025-70225 is a critical-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Dlink Dir-513 Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 32.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the CVE by requiring timely remediation of the stack buffer overflow through vendor firmware patches.
Prevents exploitation by enforcing validation of the curtime parameter inputs to the goform/formEasySetupWWConfig component, averting the buffer overflow.
Mitigates stack buffer overflow exploitation via memory protection mechanisms like stack canaries, ASLR, and DEP on the affected router firmware.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack buffer overflow in unauthenticated, public-facing web component (goform/formEasySetupWWConfig) of D-Link router directly enables exploitation of public-facing application.
NVD Description
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curtime parameter to the goform/formEasySetupWWConfig component
Deeper analysisAI
CVE-2025-70225 is a stack buffer overflow vulnerability (CWE-121) in D-Link DIR-513 router version 1.10. The flaw occurs in the goform/formEasySetupWWConfig component via manipulation of the curtime parameter. Published on 2026-03-04, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical.
An unauthenticated attacker with network access can exploit this vulnerability remotely with low attack complexity and no user interaction. Exploitation enables high-impact effects on confidentiality, integrity, and availability of the affected device.
Mitigation guidance and patches may be available through vendor resources, including the D-Link security bulletin at https://www.dlink.com/en/security-bulletin/, product support page at https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513, and a GitHub CVE report at https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70225.
Details
- CWE(s)