Impact
A stack-based buffer overflow exists in the sub_462E14 function that processes the submit-url argument of the System Log Configuration Endpoint. By supplying a crafted value, an attacker can corrupt the stack, potentially achieving arbitrary code execution on the device. The vulnerability is triggered by remote request manipulation, and an exploit is publicly available, making it feasible for attackers to target affected units.
Affected Systems
The flaw affects D‑Link DWR‑M960 routers running firmware version 1.01.07. The product is identified by CPE strings indicating the device and its firmware bundle. No other products or versions are listed as impacted.
Risk and Exploitability
The CVSS score of 8.7 signifies a high severity vulnerability. EPSS is reported as less than 1 %, indicating a low overall exploitation probability at the time of analysis, but the public availability of the exploit means that it should still be regarded as a credible threat. The vulnerability is not indexed in the CISA KEV catalog, yet it can be leveraged remotely through the web interface without local privileges, emphasizing the need for rapid remediation.
OpenCVE Enrichment