Description
A flaw has been found in D-Link DWR-M960 1.01.07. This impacts the function sub_4611CC of the file /boafrm/formNtp of the component NTP Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.
Published: 2026-02-20
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch or Mitigate
AI Analysis

Impact

The flaw is a stack‑based buffer overflow triggered by manipulating the "submit-url" parameter in the NTP configuration endpoint. An attacker can send a crafted HTTP request to the /boafrm/formNtp page from a remote host, causing the stack to corrupt and potentially allowing execution of arbitrary code on the device. This vulnerability is classified under CWE‑119 and CWE‑121 and could give an attacker full control of the router.

Affected Systems

The vulnerability affects D‑Link DWR‑M960 routers running firmware version 1.01.07. The problematic code resides in the web interface component that handles NTP configuration. All units of this model with the specified firmware version are susceptible until a patch is applied or the feature is disabled.

Risk and Exploitability

With a CVSS score of 8.7 it is classified as high severity. The EPSS score is reported as less than 1 %, indicating a low likelihood of exploitation at present, and the vulnerability is not in the CISA KEV catalog. Nevertheless, an exploit has been released and can be leveraged remotely through the web interface. The stack overflow could lead to crashes or, if the attacker successfully gains control, arbitrary code execution, giving full device compromise. The attack vector is remote via HTTP to the vulnerable endpoint, hence any host that can reach the router’s management interface is a potential threat.

Generated by OpenCVE AI on April 18, 2026 at 17:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the D‑Link support site for any firmware update that addresses the stack buffer overflow and apply it as soon as possible.
  • If no patch is available, restrict access to the router’s web interface by limiting connections to a trusted local network or VPN.
  • Disable or restrict the NTP configuration feature via router settings or ACLs if the feature is not required.
  • Monitor incoming traffic for repeated attempts to access the vulnerable endpoint, and alert on abnormal activity.

Generated by OpenCVE AI on April 18, 2026 at 17:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Fri, 20 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in D-Link DWR-M960 1.01.07. This impacts the function sub_4611CC of the file /boafrm/formNtp of the component NTP Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.
Title D-Link DWR-M960 NTP Configuration Endpoint formNtp sub_4611CC stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T14:41:43.475Z

Reserved: 2026-02-20T10:37:44.826Z

Link: CVE-2026-2854

cve-icon Vulnrichment

Updated: 2026-02-24T14:41:38.832Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T20:25:25.483

Modified: 2026-02-23T20:28:30.473

Link: CVE-2026-2854

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:00:06Z

Weaknesses