Cyber Posture

CVE-2025-70244

HighPublic PoC

Published: 10 March 2026

Published
10 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0004 13.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-70244 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Dlink Dir-513 Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Stack buffer overflow in unauthenticated web interface endpoint enables remote exploitation of public-facing application for DoS impact.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the webPage parameter to goform/formWlanSetup.

Deeper analysisAI

CVE-2025-70244 is a stack buffer overflow vulnerability (CWE-121) affecting the D-Link DIR-513 router in version 1.10. The flaw resides in the handling of the webPage parameter sent to the goform/formWlanSetup endpoint, which can be triggered over the network via the device's web interface.

A remote unauthenticated attacker can exploit this vulnerability with low complexity and no user interaction required, as indicated by its CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). Successful exploitation leads to a denial-of-service condition through high-impact availability disruption, such as device crashes or reboots, without affecting confidentiality or integrity.

Mitigation details and related advisories are available in the following references: a GitHub repository at https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70244 documenting the issue; the D-Link DIR-513 product support page at https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513; and D-Link's security bulletin page at https://www.dlink.com/en/security-bulletin/. Security practitioners should consult these for patch availability or workarounds specific to the DIR-513.

Details

CWE(s)

Affected Products

dlink
dir-513 firmware
1.10

CVEs Like This One

CVE-2025-70219Same product: Dlink Dir-513
CVE-2025-70222Same product: Dlink Dir-513
CVE-2025-70226Same product: Dlink Dir-513
CVE-2025-70230Same product: Dlink Dir-513
CVE-2025-70223Same product: Dlink Dir-513
CVE-2025-70242Same product: Dlink Dir-513
CVE-2025-70229Same product: Dlink Dir-513
CVE-2025-70221Same product: Dlink Dir-513
CVE-2025-70225Same product: Dlink Dir-513
CVE-2025-70218Same product: Dlink Dir-513

References