Impact
A stack-based buffer overflow (CWE-119/CWE-121) exists in the Advanced Firewall Configuration Endpoint of the D-Link DWR-M960 when the submit‑url argument is processed by the sub_425FF8 function. The flaw allows a remote attacker to send a crafted request that overflows the stack, enabling arbitrary code execution on the device. This can compromise the device’s confidentiality, integrity, and availability, and provides the attacker with full control of the router or firewall over the network.
Affected Systems
The vulnerability is limited to the D-Link DWR-M960 model running firmware version 1.01.07. No other firmware versions are listed as affected.
Risk and Exploitability
The Common Vulnerability Scoring System assigns a score of 8.7, indicating a high severity issue. The Exploit Prediction Scoring System score is less than 1%, suggesting a low probability of exploitation, though the flaw has been publicly disclosed and the exploit code is available. The vulnerability is not present in the CISA Known Exploited Vulnerabilities catalog. Attackers can exploit the flaw remotely by sending a malicious request to the /boafrm/formFirewallAdv endpoint, provided the Advanced Firewall Configuration Interface is enabled and accessible over the network.
OpenCVE Enrichment