CVE-2025-70221 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 5, 2026
D-Link DIR-513 - Buffer Overflow
Published: March 4, 2026Updated: March 5, 2026Remote Exploitable
Overview
D-Link DIR-513 v1.10 contains a buffer overflow caused by improper handling of the curTime parameter in goform/formLogin, letting remote attackers cause memory corruption, exploit requires crafted request.
Severity & Score
Severity: Critical
CVSS Score: 9.8
EPSS Score: 6.4%(Probability of exploitation in next 30 days)
Impact
Remote attackers can cause memory corruption, potentially leading to denial of service or remote code execution.
Mitigation
Update to the latest firmware version.
References
Social Media Activity(1 post)
TheHackerWire
@thehackerwire
š“ CVE-2025-70221 - Critical (9.8) Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin. š https://www.thehackerwire.com/vulnerability/CVE-2025-70221/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2025-70221
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- buffer_overflow
- Status
- unconfirmed
- EPSS
- 6.4%
- Social Posts
- 1
CWE
- CWE-121
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score
6.4%Probability of exploitation in the next 30 days