• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10436
(non-US) DIR-513 : All Hardware Verisons / All Firmware Version : End-of-Life (EoL) / End-of-Service-life (Eos) : Vulnerabilities Reported
Publication ID: SAP10436
Resolved Status: Yes
Published on: 7 July 2025 10:50 GMT
Last updated on: 31 July 2025 11:29 GMT

 

Overview  

The (non-US) D-Link DIR-513 Wi-Fi Device, all hardware revisions and firmware versions are legacy devices listed below in the table. All hardware revisions have reached their End of Life ("EOL") /End of Service Life ("EOS") Lifecycle.  D-Link US recommends that D-Link devices that have reached EOL/EOS be retired and replaced. If outside the US, please get in touch with your regional office for recommendations (LINK). 

 

As a general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products ceases.  Please read the information and recommendations below.
  

3rd Party Report information

Report 1: Reported 06/30/2025

           Author(s): lbazhuayu (VulDB User)  VULdb Disclosure

Disclosure:  CVE-2025-6882 : (Link) :D-Link DIR-513 formSetWanPPTP buffer overflow

Description: A vulnerability classified as critical has been found in D-Link DIR-513 1.0. This affects an unknown part of the file /goform/formSetWanPPTP. The manipulation of the argument curTime leads to buffer overflow.

CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption

CVSS:

Score

Severity

Version

Vector String

8.7

HIGH

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

8.8

HIGH

3.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

8.8

HIGH

3.0

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

9.0

2.0

AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

 

All models, Derivative Models, All Revisions, and All Firmware

 

 

Report 2: Reported 07/20/2025

Author(s): bazhuayu (VulDB User) VULdb Disclosure

Disclosure:  CVE-2025-7909: (Link): DIR-513 Boa Webserver formLanSetupRouterSettings sprintf stack-based overflow

Description: A vulnerability was found in D-Link DIR-513 1.0. It has been rated as critical. The function sprintf in the file /goform/formLanSetupRouterSettings of the Boa Webserver component is affected by this issue. The manipulation of the argument curTime leads to a stack-based buffer overflow.

CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption

CVSS:

Score

Severity

Version

Vector String

8.7

HIGH

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

8.8

HIGH

3.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

8.8

HIGH

3.0

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

9.0

2.0

AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

 

All models, Derivative Models, All Revisions, and All Firmware

 

Report 3: Reported 07/20/2025

Author(s): bazhuayu ( (VulDB User) VULdb Disclosure

Disclosure:  CVE-2025-7910: (Link): DIR-513 Boa Webserver formLanSetupRouterSettings sprintf stack-based overflow

Description: A vulnerability classified as critical has been found in D-Link DIR-513 1.10. This affects the function sprintf of the file /goform/formSetWanNonLogin of the component Boa Webserver. The manipulation of the argument curTime leads to a stack-based buffer overflow.

CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption

CVSS:

Score

Severity

Version

Vector String

8.7

HIGH

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

8.8

HIGH

3.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

8.8

HIGH

3.0

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

9.0

2.0

AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

 

All models, Derivative Models, All Revisions, and All Firmware

 

Report 4: Reported 07/21/2025

Author(s): Yning ( (VulDB User) VULdb Disclosure

Disclosure:  CVE-2025-7945: (Link): DIR-513 formSetWanDhcpplus buffer overflow

Description: A vulnerability was found in D-Link DIR-513 up to 20190831. It has been declared as critical. This vulnerability affects the function formSetWanDhcpplus of the file /goform/formSetWanDhcpplus. The manipulation of the argument curTime leads to buffer overflow.

CWE:  CWE-120: Buffer Overflow / CWE-119: Memory Corruption

CVSS:

Score

Severity

Version

Vector String

8.7

HIGH

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

8.8

HIGH

3.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

8.8

HIGH

3.0

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

9.0

2.0

AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

 

All models, Derivative Models, All Revisions, and All Firmware

 

 

Report 5: Reported 07/25/2025

Author(s): Weining Xiao ( (VulDB User) VULdb Disclosure

Disclosure:  CVE-2025-8159: (Link): DIR-513 HTTP POST Request formLanguageChange stack-based overflow

Description: A vulnerability was found in D-Link DIR-513 up to 20190831. It has been declared as critical. This vulnerability affects the function formSetWanDhcpplus of the file /goform/formSetWanDhcpplus. The manipulation of the argument curTime leads to buffer overflow.

CWE:  CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption

CVSS:

Score

Severity

Version

Vector String

8.7

HIGH

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

8.8

HIGH

3.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

8.8

HIGH

3.0

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

9.0

2.0

AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

 

All models, Derivative Models, All Revisions, and All Firmware

 

Report 6: Reported 07/25/2025

Author(s): AttackingLin ( (VulDB User) VULdb Disclosure

Disclosure:  CVE-2025-8168: (Link): DIR-513 formSetWanPPPoE websAspInit buffer overflow

Description: A vulnerability was found in D-Link DIR-513 1.10. It has been rated as critical. Affected by this issue is the function websAspInit of the file /goform/formSetWanPPPoE. The manipulation of the argument curTime leads to buffer overflow.

CWE:  CWE-120: Buffer Overflow / CWE-119: Memory Corruption

CVSS:

Score

Severity

Version

Vector String

8.7

HIGH

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

8.8

HIGH

3.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

8.8

HIGH

3.0

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

9.0

2.0

AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

 

All models, Derivative Models, All Revisions, and All Firmware

 

 

Report 7: Reported 07/25/2025

Author(s): AttackingLin ( (VulDB User) VULdb Disclosure

Disclosure:  CVE-2025-8169: (Link): DIR- 513 HTTP POST Request formSetWanPPTPpath

Description: A vulnerability classified as critical has been found in D-Link DIR-513 1.10. This affects the function formSetWanPPTPcallback of the file /goform/formSetWanPPTPpath of the component HTTP POST Request Handler. The manipulation of the argument curTime leads to buffer overflow.

CWE:  CWE-120: Buffer Overflow / CWE-119: Memory Corruption

CVSS:

Score

Severity

Version

Vector String

8.7

HIGH

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

8.8

HIGH

3.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

8.8

HIGH

3.0

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

9.0

2.0

AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

 

All models, Derivative Models, All Revisions, and All Firmware

 

 

Report 8: Reported 07/26/2025

Author(s): AttackingLin ( (VulDB User) VULdb Disclosure

Disclosure:  CVE-2025-8184: (Link): DIR- 513 HTTP POST Request formSetWanPPTPpath

Description: A vulnerability was found in D-Link DIR-513 up to 1.10 and classified as critical. This issue affects the function formSetWanL2TPcallback of the file /goform/formSetWanL2TPtriggers of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow.

CWE:  CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption

CVSS:

Score

Severity

Version

Vector String

8.7

HIGH

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

8.8

HIGH

3.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

8.8

HIGH

3.0

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

9.0

2.0

AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

All models, Derivative Models, All Revisions, and All Firmware

 

Accused Model(s)

Model

Rev

Region

Accused firmware

EOL/EOS

Legacy Site

Recommendation

 Last Updated

DIR-513

All

Worldwide

v1.0 or Lower

04/24/2024

            Non-US

Retire and Replace

07/31/2025

 ** H/W revision Jx is still available in some non-US regions; it is not affected by this vulnerability.

 

Recommendation for End-of-Support/End of Life Products


From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to the evolution of technology, market demands, innovations, or product efficiencies based on new technologies, or when the product matures over time and should be replaced by functionally superior technology.

 For US Consumer

 If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is usually no further extended support or development for it.

 Typically, for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support have ceased. 

 D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please ensure the device has the most recent firmware, frequently update its unique password for web configuration access, and always enable WIFI encryption with a unique password.