CVE-2025-70251
Published: 10 March 2026
Summary
CVE-2025-70251 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Dlink Dir-513 Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote exploitation of public web management interface (T1190) via crafted request to trigger stack buffer overflow resulting in system/application crash (T1499.004).
NVD Description
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the webPage parameter to goform/formWlanGuestSetup.
Deeper analysisAI
CVE-2025-70251 is a stack buffer overflow vulnerability (CWE-121) in the D-Link DIR-513 router version 1.10. The flaw occurs via the webPage parameter sent to the /goform/formWlanGuestSetup endpoint, which can be triggered through the device's web interface.
The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating it is exploitable over the network with low attack complexity, no authentication or user interaction required, and unchanged scope. A remote unauthenticated attacker can send a specially crafted request to trigger the buffer overflow, resulting in a denial-of-service condition through high availability impact, such as device crashes or reboots, with no direct effects on confidentiality or integrity.
For mitigation details, refer to D-Link's security bulletin at https://www.dlink.com/en/security-bulletin/, the DIR-513 product support page at https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513, and the CVE report on GitHub at https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70251. The vulnerability was published on 2026-03-10.
Details
- CWE(s)