Impact
A stack-based buffer overflow exists in the formFilter endpoint of the D-Link DWR‑M960 firmware. Manipulating the submit‑url argument over HTTP can overflow the stack, allowing an attacker to execute arbitrary code. The vulnerability is related to buffer overflow weaknesses (CWE‑119 and CWE‑121) and can compromise confidentiality, integrity, and availability of the device.
Affected Systems
The affected device is the D‑Link DWR‑M960 wireless router running firmware version 1.01.07. No other versions or products are listed, so only this specific firmware build is known to be vulnerable.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity vulnerability that may allow remote code execution. The EPSS score of less than 1% suggests a low probability of exploitation in the wild, but the exploit has been made public, so the risk remains significant if the device is exposed to the internet. The vulnerability is not recorded in the CISA KEV catalog. The attack vector is likely remote, via a crafted HTTP request to the /boafrm/formFilter endpoint, and does not require authentication.
OpenCVE Enrichment