LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2025-70222

CVE-2025-70222 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 5, 2026

D-Link DIR-513 - Buffer Overflow

Published: March 4, 2026Updated: March 5, 2026Remote Exploitable

Overview

D-Link DIR-513 v1.10 contains a buffer overflow caused by improper handling of the curTime parameter in goform/formLogin and goform/getAuthCode, letting attackers cause memory corruption remotely, exploit requires crafted request.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 6.4%(Probability of exploitation in next 30 days)

Impact

Attackers can cause memory corruption leading to potential remote code execution or denial of service.

Mitigation

Update to the latest firmware version provided by D-Link.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 5, 2026

šŸ”“ CVE-2025-70222 - Critical (9.8) Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin,goform/getAuthCode. šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2025-70222/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2025-70222
Severity
Critical
CVSS Score
9.8
Type
buffer_overflow
Status
unconfirmed
EPSS
6.4%
Social Posts
1

CWE

  • CWE-121

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

6.4%Probability of exploitation in the next 30 days