Impact
A stack-based buffer overflow vulnerability exists in the sub_46385C function of the /boafrm/formDosCfg module on the D-Link DWR-M960. Manipulating the submit-url argument overflows a local buffer, allowing an attacker to execute arbitrary code on the device. The flaw is exposed through a remote web interface and is publicly documented, meaning an exploitable payload can be delivered without local access. The identified weaknesses correspond to CWE-119 and CWE-121, indicating insecure buffer handling and lack of bounds checking.
Affected Systems
This issue affects the D-Link DWR-M960 router running firmware version 1.01.07. No other firmware releases are listed in the data, and it is inferred that systems with older or equivalent builds may also be vulnerable unless patched to a non‑vulnerable revision.
Risk and Exploitability
The CVSS score of 8.7 classifies the exploit as high severity, and the EPSS score of less than 1% denotes a very low probability of widespread exploitation at the time of analysis. The vulnerability is not currently included in the CISA KEV catalog, but the public nature of the exploit suggests that attackers could attempt to target exposed routers. Remote exploitation is possible by sending a crafted submit-url request to the router’s web interface, potentially over the open internet or a local network with remote management enabled.
OpenCVE Enrichment