D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting in a path traversal vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70231 | Exploit Third Party Advisory |
| https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513 | Product |
| https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
06 Mar 2026, 17:37
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:dlink:dir-513_firmware:1.10:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-513:-:*:*:*:*:*:*:* |
|
| First Time |
Dlink dir-513
Dlink dir-513 Firmware Dlink |
|
| References | () https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70231 - Exploit, Third Party Advisory | |
| References | () https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513 - Product | |
| References | () https://www.dlink.com/en/security-bulletin/ - Vendor Advisory |
06 Mar 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-22 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
05 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-05 19:16
Updated : 2026-03-06 17:37
NVD link : CVE-2025-70231
Mitre link : CVE-2025-70231
CVE.ORG link : CVE-2025-70231
JSON object : View
Products Affected
dlink
- dir-513_firmware
- dir-513
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
