Description
A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
Published: 2026-02-21
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via stack-based buffer overflow
Action: Immediate Patch
AI Analysis

Impact

An improperly validated argument, submit-url, in the sub_469104 function of /boafrm/formIpv6Setup triggers a stack-based buffer overflow. The flaw can be triggered remotely by sending crafted inputs, potentially allowing an attacker to overwrite the stack and execute arbitrary code on the D‑Link DWR‑M960 device. This creates a risk of full system compromise or persistent foothold as the overflow can lead to code execution or denial of service.

Affected Systems

The vulnerability affects D‑Link DWR‑M960 routers running firmware version 1.01.07. The problem resides in the formIpv6Setup handling within that firmware build. All devices operating this specific firmware revision are exposed; other firmware revisions have not been confirmed as vulnerable.

Risk and Exploitability

The flaw carries a CVSS score of 8.7, indicating high severity. The EPSS score is listed as less than 1 %, suggesting a low likelihood of widespread exploitation so far, yet a public exploit has been released, and the attack can be performed from a remote network by manipulating the submit-url parameter. While the vulnerability is not recorded in the CISA KEV catalog, its potential for remote code execution, combined with the availability of a public exploit, means that it should be treated with high priority and mitigated promptly.

Generated by OpenCVE AI on April 17, 2026 at 16:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device firmware to a version released by D‑Link that resolves the submit‑url handling issue, if such a version is available.
  • If a firmware update is unavailable, block or restrict HTTP access to the /boafrm/formIpv6Setup handler from untrusted or external networks.
  • Implement network segmentation or firewall rules to limit remote management traffic to trusted internal clients only, thereby reducing the attack surface for the vulnerable endpoint.
  • If possible, disable IPv6 management on the router until a patch is applied, to eliminate the specific exploitation path.

Generated by OpenCVE AI on April 17, 2026 at 16:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Sat, 21 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
Title D-Link DWR-M960 formIpv6Setup sub_469104 stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:32:07.007Z

Reserved: 2026-02-20T16:59:21.658Z

Link: CVE-2026-2885

cve-icon Vulnrichment

Updated: 2026-02-23T19:31:55.588Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T21:16:10.907

Modified: 2026-02-23T19:37:28.037

Link: CVE-2026-2885

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:45:15Z

Weaknesses