


Perceptive Security
SOC/SIEM Consultancy

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard52.
Published:
8 maart 2026 om 23:00:00
Alert date:
9 maart 2026 om 21:02:12
Source:
nvd.nist.gov
Network Infrastructure, Mobile & IoT
A stack buffer overflow vulnerability has been identified in D-Link DIR-513 router version 1.10. The vulnerability is triggered through the curTime parameter in the goform/formSetWAN_Wizard52 endpoint. This type of vulnerability can potentially allow attackers to execute arbitrary code or cause denial of service by overwriting memory on the stack. The affected device is a wireless router commonly used in home and small business environments. The vulnerability affects the WAN setup wizard functionality of the device's web interface.
Technical details
Mitigation steps:
Affected products:
D-Link DIR-513
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2025-70238
https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70238
https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513
https://www.dlink.com/en/security-bulletin/
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
