Cyber Posture

CVE-2025-7910

HighPublic PoC

Published: 20 July 2025

Published
20 July 2025
Modified
25 July 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0071 72.4th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-7910 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Dlink Dir-513 Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 27.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SA-22 (Unsupported System Components) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Prohibits the use of unsupported end-of-life system components like the D-Link DIR-513 router, directly preventing exposure to this unpatchable stack-based buffer overflow vulnerability.

prevent

Enforces boundary protection to monitor and control remote network access to the vulnerable /goform/formSetWanNonLogin endpoint, blocking exploitation over the network.

prevent

Implements memory protections such as non-executable stacks and address space randomization to mitigate successful exploitation of the stack-based buffer overflow in sprintf.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote stack-based buffer overflow in public-facing Boa webserver form handler enables arbitrary code execution via crafted HTTP requests to Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability classified as critical has been found in D-Link DIR-513 1.10. This affects the function sprintf of the file /goform/formSetWanNonLogin of the component Boa Webserver. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible…

more

to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Deeper analysisAI

CVE-2025-7910 is a critical stack-based buffer overflow vulnerability affecting the D-Link DIR-513 router on firmware version 1.10. The flaw exists in the sprintf function within the /goform/formSetWanNonLogin file of the Boa Webserver component, where manipulation of the 'curTime' argument triggers the overflow. Published on 2025-07-20, it is associated with CWEs-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow), earning a CVSS v3.1 base score of 8.8.

The vulnerability enables remote exploitation over the network (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) and no user interaction (UI:N), while maintaining unchanged scope (S:U). Attackers can achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), potentially leading to full system compromise through the buffer overflow.

No patches are available, as the vulnerability only affects products no longer supported by the maintainer, per advisories on VulDB and the D-Link website. An exploit has been publicly disclosed in a GitHub repository detailing the formSetWanNonLogin issue, and it may be actively used given its availability. Mitigation requires isolating affected devices or decommissioning them, as referenced in VulDB entries (ctiid.317025, id.317025).

Details

CWE(s)

Affected Products

dlink
dir-513 firmware
1.10

CVEs Like This One

CVE-2026-3978Same product: Dlink Dir-513
CVE-2025-7909Same product: Dlink Dir-513
CVE-2025-8159Same product: Dlink Dir-513
CVE-2025-8184Same product: Dlink Dir-513
CVE-2025-70219Same product: Dlink Dir-513
CVE-2025-70230Same product: Dlink Dir-513
CVE-2025-70242Same product: Dlink Dir-513
CVE-2025-70220Same product: Dlink Dir-513
CVE-2025-70232Same product: Dlink Dir-513
CVE-2025-70222Same product: Dlink Dir-513

References