Description
A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
Published: 2026-02-20
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the formFilter endpoint of the D-Link DWR‑M960 firmware. Manipulating the submit‑url argument over HTTP can overflow the stack, allowing an attacker to execute arbitrary code. The vulnerability is related to buffer overflow weaknesses (CWE‑119 and CWE‑121) and can compromise confidentiality, integrity, and availability of the device.

Affected Systems

The affected device is the D‑Link DWR‑M960 wireless router running firmware version 1.01.07. No other versions or products are listed, so only this specific firmware build is known to be vulnerable.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity vulnerability that may allow remote code execution. The EPSS score of less than 1% suggests a low probability of exploitation in the wild, but the exploit has been made public, so the risk remains significant if the device is exposed to the internet. The vulnerability is not recorded in the CISA KEV catalog. The attack vector is likely remote, via a crafted HTTP request to the /boafrm/formFilter endpoint, and does not require authentication.

Generated by OpenCVE AI on April 17, 2026 at 17:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to the latest version that addresses the sub_424AFC stack overflow.
  • Block or restrict external access to the /boafrm/formFilter URL through the firewall or router configuration to prevent unauthenticated requests.
  • Disable remote management or limit it to secure, authenticated connections and ensure the router is not exposed to the public internet.

Generated by OpenCVE AI on April 17, 2026 at 17:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Fri, 20 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
Title D-Link DWR-M960 Filter Configuration Endpoint formFilter sub_424AFC stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T14:45:30.706Z

Reserved: 2026-02-20T10:37:50.188Z

Link: CVE-2026-2856

cve-icon Vulnrichment

Updated: 2026-02-24T14:45:25.507Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T21:19:30.610

Modified: 2026-02-23T20:27:19.517

Link: CVE-2026-2856

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:15:23Z

Weaknesses