Description
A vulnerability has been found in D-Link DWR-M960 1.01.07. Affected is the function sub_4648F0 of the file /boafrm/formDdns of the component DDNS Settings Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-02-20
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the DDNS Settings Handler of D-Link DWR-M960 firmware 1.01.07, triggered by manipulating the submit-url argument. The vulnerability can be exercised remotely and may allow an attacker to execute arbitrary code on the device, potentially compromising confidentiality, integrity, and availability. The weakness is represented by CWE-119 and CWE-121.

Affected Systems

D-Link DWR-M960 handheld router, firmware version 1.01.07. The vulnerability resides in the /boafrm/formDdns component of the DDNS Settings feature. No other versions or products are listed as affected in the provided data.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, while the EPSS score of less than 1% suggests low probability of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. As the attack vector is remote and does not require local privileges, the risk to an exposed device is significant. Attackers can trigger the overflow by sending a crafted request to the formDdns endpoint, thereby potentially taking control of the router.

Generated by OpenCVE AI on April 17, 2026 at 17:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from D-Link that addresses the stack overflow issue.
  • If an update is unavailable, disable the DDNS feature or block access to the /boafrm/formDdns endpoint using firewall or access‑control rules.
  • Alternatively, enforce input validation on the submit‑url parameter to reject overly long or malformed data before it reaches the vulnerable function.

Generated by OpenCVE AI on April 17, 2026 at 17:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Fri, 20 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in D-Link DWR-M960 1.01.07. Affected is the function sub_4648F0 of the file /boafrm/formDdns of the component DDNS Settings Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Title D-Link DWR-M960 DDNS Settings formDdns sub_4648F0 stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T14:43:57.058Z

Reserved: 2026-02-20T10:37:47.663Z

Link: CVE-2026-2855

cve-icon Vulnrichment

Updated: 2026-02-24T14:43:52.361Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T20:25:25.690

Modified: 2026-02-23T20:27:55.050

Link: CVE-2026-2855

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:15:23Z

Weaknesses