Description
A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element is the function sub_41914C of the file /boafrm/formWanConfigSetup of the component WAN Interface Setting Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Published: 2026-02-21
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via stack-based buffer overflow
Action: Immediate Patch
AI Analysis

Impact

The vulnerability exists in the sub_41914C function within the /boafrm/formWanConfigSetup component of the D-Link DWR‑M960 router’s firmware 1.01.07. An attacker can supply an overly long or otherwise malformed submit‑url argument to trigger a stack‑based buffer overflow. Because the web management interface is exposed over the WAN, the exploit can be performed remotely.

Affected Systems

Affected systems are D-Link DWR‑M960 Routers running firmware version 1.01.07. No other vendor or product versions are currently known to be impacted by this specific overflow. Users of newer firmware editions may be unaffected, but verification against the vendor’s release notes is recommended.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity issue, and the EPSS score of less than 1 % suggests a relatively low likelihood of immediate exploitation in the wild, though a publicly available exploit exists. Since the flaw resides in a remote‑accessible web interface, any authenticated administrator or a malicious actor with network visibility can potentially achieve arbitrary code execution, compromising the device and the networks it controls.

Generated by OpenCVE AI on April 18, 2026 at 11:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official firmware update that addresses the sub_41914C stack overflow.
  • If no update is available, disable remote access to the WAN Interface Settings page or limit it to trusted IP addresses.
  • Use a web application firewall or router ACL to block requests that contain excessively long submit‑url values and enforce strict parameter length limits. Ensure that any web configuration interface is protected by strong authentication and uses TLS.

Generated by OpenCVE AI on April 18, 2026 at 11:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Sat, 21 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element is the function sub_41914C of the file /boafrm/formWanConfigSetup of the component WAN Interface Setting Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Title D-Link DWR-M960 WAN Interface Setting formWanConfigSetup sub_41914C stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:32:58.848Z

Reserved: 2026-02-20T16:59:18.740Z

Link: CVE-2026-2884

cve-icon Vulnrichment

Updated: 2026-02-23T19:32:52.389Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T21:16:10.680

Modified: 2026-02-23T19:38:07.900

Link: CVE-2026-2884

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:30:44Z

Weaknesses