


Perceptive Security
SOC/SIEM Consultancy

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAdvNetwork.
Published:
3 maart 2026 om 23:00:00
Alert date:
4 maart 2026 om 20:01:54
Source:
nvd.nist.gov
Network Infrastructure, Mobile & IoT
A stack buffer overflow vulnerability has been identified in D-Link DIR-513 router firmware version 1.10. The vulnerability exists in the curTime parameter of the goform/formAdvNetwork endpoint. This type of vulnerability can potentially allow attackers to execute arbitrary code or cause denial of service by overflowing the stack buffer. The vulnerability affects the advanced network configuration functionality of the router. Given that this is a network infrastructure device vulnerability with potential for remote exploitation, it poses significant security risks to affected users.
Technical details
Mitigation steps:
Affected products:
D-Link DIR-513
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2025-70223
https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70223
https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513
https://www.dlink.com/en/security-bulletin/
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
