Description
A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_427D74 of the file /boafrm/formIpQoS. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-02-21
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a stack‑based buffer overflow in the sub_427D74 function of /boafrm/formIpQoS, triggered by manipulating the submit‑url parameter. This flaw allows an attacker who can send a crafted request to the device to overwrite memory on the stack, potentially gaining execution control. The bug is mapped to buffer overflow and stack memory corruption weaknesses, enabling remote code execution and compromise of the device’s integrity and availability.

Affected Systems

D‑Link DWR‑M960 routers running firmware version 1.01.07 are affected. The issue resides specifically within the formIpQoS handler of the HTTP interface. No other firmware versions are listed as impacted. Devices that expose this interface to remote networks are at risk.

Risk and Exploitability

The CVSS base score of 8.7 indicates high severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not currently listed in the CISA KEV catalog, but it has been publicly disclosed and the exploit is available. Attackers can reach the vulnerable function remotely via the network, making the risk significant for devices exposed to the internet. With a stack buffer overflow, the exploitation demands only a crafted HTTP request and no privileged user interaction, hence the risk remains high despite the low exploitation probability.

Generated by OpenCVE AI on April 17, 2026 at 16:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the D‑Link DWR‑M960 to the latest firmware that resolves the stack overflow in formIpQoS. If a patched firmware is not available, replace the device with a model that includes the fix.
  • Disable remote access to the formIpQoS interface or block its network port using firewall rules to prevent attackers from reaching the vulnerable path.
  • Apply network segmentation and restrict access to the device’s management interface to a trusted internal network or use VPN to limit exposure.

Generated by OpenCVE AI on April 17, 2026 at 16:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Sat, 21 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_427D74 of the file /boafrm/formIpQoS. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
Title D-Link DWR-M960 formIpQoS sub_427D74 stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:40:34.066Z

Reserved: 2026-02-20T16:59:15.863Z

Link: CVE-2026-2883

cve-icon Vulnrichment

Updated: 2026-02-23T19:40:23.524Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T20:16:40.310

Modified: 2026-02-23T19:41:14.377

Link: CVE-2026-2883

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:45:15Z

Weaknesses