Impact
A stack-based buffer overflow exists in the DDNS Settings Handler of D-Link DWR-M960 firmware 1.01.07, triggered by manipulating the submit-url argument. The vulnerability can be exercised remotely and may allow an attacker to execute arbitrary code on the device, potentially compromising confidentiality, integrity, and availability. The weakness is represented by CWE-119 and CWE-121.
Affected Systems
D-Link DWR-M960 handheld router, firmware version 1.01.07. The vulnerability resides in the /boafrm/formDdns component of the DDNS Settings feature. No other versions or products are listed as affected in the provided data.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, while the EPSS score of less than 1% suggests low probability of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. As the attack vector is remote and does not require local privileges, the risk to an exposed device is significant. Attackers can trigger the overflow by sending a crafted request to the formDdns endpoint, thereby potentially taking control of the router.
OpenCVE Enrichment