Description
A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_46385C of the file /boafrm/formDosCfg. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Published: 2026-02-21
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via stack-based overflow
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow vulnerability exists in the sub_46385C function of the /boafrm/formDosCfg module on the D-Link DWR-M960. Manipulating the submit-url argument overflows a local buffer, allowing an attacker to execute arbitrary code on the device. The flaw is exposed through a remote web interface and is publicly documented, meaning an exploitable payload can be delivered without local access. The identified weaknesses correspond to CWE-119 and CWE-121, indicating insecure buffer handling and lack of bounds checking.

Affected Systems

This issue affects the D-Link DWR-M960 router running firmware version 1.01.07. No other firmware releases are listed in the data, and it is inferred that systems with older or equivalent builds may also be vulnerable unless patched to a non‑vulnerable revision.

Risk and Exploitability

The CVSS score of 8.7 classifies the exploit as high severity, and the EPSS score of less than 1% denotes a very low probability of widespread exploitation at the time of analysis. The vulnerability is not currently included in the CISA KEV catalog, but the public nature of the exploit suggests that attackers could attempt to target exposed routers. Remote exploitation is possible by sending a crafted submit-url request to the router’s web interface, potentially over the open internet or a local network with remote management enabled.

Generated by OpenCVE AI on April 18, 2026 at 11:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to a version that contains the fix for the formDosCfg stack overflow
  • If a firmware update is not immediately available, disable remote web management or restrict access to the router’s web interface via firewall rules or VLAN segmentation
  • Continuously monitor web access logs for suspicious submit-url parameters and anomalous traffic patterns that may indicate exploitation attempts

Generated by OpenCVE AI on April 18, 2026 at 11:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Sat, 21 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_46385C of the file /boafrm/formDosCfg. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Title D-Link DWR-M960 formDosCfg sub_46385C stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:39:50.023Z

Reserved: 2026-02-20T16:59:12.920Z

Link: CVE-2026-2882

cve-icon Vulnrichment

Updated: 2026-02-23T19:39:41.596Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T20:16:40.103

Modified: 2026-02-23T19:42:15.040

Link: CVE-2026-2882

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:30:44Z

Weaknesses