Cyber Posture

CVE-2025-70231

CriticalPublic PoC

Published: 05 March 2026

Published
05 March 2026
Modified
06 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0023 46.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-70231 is a critical-severity Path Traversal (CWE-22) vulnerability in Dlink Dir-513 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 46.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the path traversal vulnerability by requiring validation of the FILECODE parameter to reject traversal sequences like '../' and ensure only intended paths are processed.

prevent

Enforces logical access controls on files and directories, mitigating unauthorized reads or writes resulting from unfiltered path traversal in the /goform/getAuthCode endpoint.

prevent

Mandates identification, reporting, and timely patching of the specific flaw in D-Link DIR-513 v1.10 as detailed in vendor advisories, eliminating the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Path traversal vulnerability in public-facing web endpoint of D-Link router enables remote unauthenticated exploitation of public-facing application (T1190), potentially allowing arbitrary file read/write/execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting in a path traversal vulnerability.

Deeper analysisAI

CVE-2025-70231, published on 2026-03-05, is a critical path traversal vulnerability (CWE-22) in D-Link DIR-513 version 1.10. The flaw arises when the device processes POST requests related to verification codes via the /goform/formLogin endpoint, which forwards to /goform/getAuthCode without properly filtering the FILECODE parameter. This allows traversal outside intended directories. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote attackers can exploit this vulnerability over the network with low attack complexity, requiring no authentication privileges or user interaction. Exploitation enables high-impact compromise of confidentiality, integrity, and availability, potentially allowing arbitrary file read, write, or execution depending on the traversed paths.

Mitigation guidance and patches are referenced in vendor advisories, including D-Link's security bulletin at https://www.dlink.com/en/security-bulletin/, product support page at https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513, and a detailed report at https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70231.

Details

CWE(s)

Affected Products

dlink
dir-513 firmware
1.10

CVEs Like This One

CVE-2025-70240Same product: Dlink Dir-513
CVE-2026-3978Same product: Dlink Dir-513
CVE-2025-70225Same product: Dlink Dir-513
CVE-2025-10792Same product: Dlink Dir-513
CVE-2025-70222Same product: Dlink Dir-513
CVE-2025-70220Same product: Dlink Dir-513
CVE-2025-70245Same product: Dlink Dir-513
CVE-2025-70226Same product: Dlink Dir-513
CVE-2025-8184Same product: Dlink Dir-513
CVE-2025-70229Same product: Dlink Dir-513

References