Description
A flaw has been found in D-Link DWR-M961 1.1.47. This vulnerability affects the function sub_419920 of the file /boafrm/formLtefotaUpgradeQuectel. This manipulation of the argument fota_url causes command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Published: 2026-01-29
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Apply Patch
AI Analysis

Impact

The flaw is a command injection vulnerability in the sub_419920 function of the /boafrm/formLtefotaUpgradeQuectel file. By manipulating the fota_url argument, a remote attacker can inject and execute arbitrary operating system commands on the device, which places the flaw in the CWE-74 and CWE-77 categories. This allows the attacker to gain full control of the affected router.

Affected Systems

D-Link DWR-M961 routers running firmware version 1.1.47 are affected. Owners of devices with this firmware should verify whether they use this model and assess the need for remediation.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of widespread exploitation. However, the vulnerability is publicly documented, and exploits have been published, so the risk is not negligible. The attack requires network connectivity to the /boafrm/formLtefotaUpgradeQuectel endpoint, which may be reachable from the internet or internal networks depending on configuration. The device is not listed in CISA’s KEV catalog, but the exposure remains significant.

Generated by OpenCVE AI on April 18, 2026 at 01:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device firmware to a version that addresses the command injection flaw, such as firmware 1.1.48 or later.
  • If an upgrade is not immediately possible, restrict network access to the /boafrm/formLtefotaUpgradeQuectel endpoint by configuring firewall rules or disabling remote management features.
  • Disable or remove the firmware upgrade service if it is not required, to eliminate the attack surface.

Generated by OpenCVE AI on April 18, 2026 at 01:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m961
Dlink dwr-m961 Firmware
CPEs cpe:2.3:h:dlink:dwr-m961:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m961_firmware:1.1.47:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m961
Dlink dwr-m961 Firmware

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m961
Vendors & Products D-link
D-link dwr-m961

Thu, 29 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 16:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in D-Link DWR-M961 1.1.47. This vulnerability affects the function sub_419920 of the file /boafrm/formLtefotaUpgradeQuectel. This manipulation of the argument fota_url causes command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Title D-Link DWR-M961 formLtefotaUpgradeQuectel sub_419920 command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m961
Dlink Dwr-m961 Dwr-m961 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:05:29.768Z

Reserved: 2026-01-29T08:34:29.251Z

Link: CVE-2026-1596

cve-icon Vulnrichment

Updated: 2026-01-29T21:29:42.639Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T16:16:14.990

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1596

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:30:16Z

Weaknesses