Description
A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the function sub_462E14 of the file /boafrm/formSysLog of the component System Log Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Published: 2026-02-20
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the sub_462E14 function that processes the submit-url argument of the System Log Configuration Endpoint. By supplying a crafted value, an attacker can corrupt the stack, potentially achieving arbitrary code execution on the device. The vulnerability is triggered by remote request manipulation, and an exploit is publicly available, making it feasible for attackers to target affected units.

Affected Systems

The flaw affects D‑Link DWR‑M960 routers running firmware version 1.01.07. The product is identified by CPE strings indicating the device and its firmware bundle. No other products or versions are listed as impacted.

Risk and Exploitability

The CVSS score of 8.7 signifies a high severity vulnerability. EPSS is reported as less than 1 %, indicating a low overall exploitation probability at the time of analysis, but the public availability of the exploit means that it should still be regarded as a credible threat. The vulnerability is not indexed in the CISA KEV catalog, yet it can be leveraged remotely through the web interface without local privileges, emphasizing the need for rapid remediation.

Generated by OpenCVE AI on April 17, 2026 at 17:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest firmware update from D‑Link that patches the stack overflow in the System Log Configuration Endpoint.
  • If an update is not yet available, block external access to the web interface that hosts the /boafrm/formSysLog endpoint using firewall rules or VPN restrictions.
  • Continuously monitor the device’s logs and network traffic for signs of attempted buffer‑overflow exploitation, and investigate any anomalies promptly.

Generated by OpenCVE AI on April 17, 2026 at 17:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Fri, 20 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the function sub_462E14 of the file /boafrm/formSysLog of the component System Log Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Title D-Link DWR-M960 System Log Configuration Endpoint formSysLog sub_462E14 stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T14:40:30.014Z

Reserved: 2026-02-20T10:37:41.032Z

Link: CVE-2026-2853

cve-icon Vulnrichment

Updated: 2026-02-24T14:40:25.703Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T20:25:25.270

Modified: 2026-02-23T20:29:33.487

Link: CVE-2026-2853

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:15:23Z

Weaknesses