Description
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_42B5A0 of the file /boafrm/formBridgeVlan of the component Bridge VLAN Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Published: 2026-02-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stack-based buffer overflow in the sub_42B5A0 function of the /boafrm/formBridgeVlan component. Manipulating the submit-url argument allows a remote attacker to overflow the buffer, potentially enabling arbitrary code execution or system compromise. The weakness corresponds to CWE‑119 (Buffer Overflow) and CWE‑121 (Stack-based Buffer Overflow).

Affected Systems

D‑Link DWR‑M960 routers running firmware version 1.01.07 are affected.

Risk and Exploitability

The CVSS v3.1 score is 8.7, indicating high severity. The EPSS score is below 1%, suggesting a low yet non‑zero probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. The attack vector is remote; a public exploit exists that targets the Bridge VLAN Configuration Endpoint via the web interface.

Generated by OpenCVE AI on April 17, 2026 at 16:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the D‑Link DWR‑M960 firmware to the latest version that addresses the buffer overflow.
  • If a firmware update is not immediately available, disable or restrict access to the Bridge VLAN configuration web endpoint (e.g., block the corresponding URL or network ports).
  • Deploy a web application firewall rule or intrusion detection system rule to log or block suspicious requests to the /boafrm/formBridgeVlan endpoint.

Generated by OpenCVE AI on April 17, 2026 at 16:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Sun, 22 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_42B5A0 of the file /boafrm/formBridgeVlan of the component Bridge VLAN Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Title D-Link DWR-M960 Bridge VLAN Configuration Endpoint formBridgeVlan sub_42B5A0 stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-26T16:24:22.439Z

Reserved: 2026-02-21T04:58:27.633Z

Link: CVE-2026-2925

cve-icon Vulnrichment

Updated: 2026-02-26T16:24:16.973Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T04:16:00.047

Modified: 2026-02-23T19:36:36.873

Link: CVE-2026-2925

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:45:15Z

Weaknesses