Description
D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting in a path traversal vulnerability.
References (3)
Core 3
Core References
Exploit, Third Party Advisory
https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70231
Various Sources
https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513
Various Sources
https://www.dlink.com/en/security-bulletin/
Scores
CVSS v3
9.8
EPSS
0.0022
EPSS Percentile
44.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-22
Status
published
Products (1)
dlink/dir-513_firmware
1.10
Published
Mar 05, 2026
Tracked Since
Mar 06, 2026