Impact
The vulnerability is a stack-based buffer overflow in the LTE Configuration Endpoint of the D-Link DWR-M960. Manipulating the submit-url parameter within the formLteSetup function allows a remote attacker to overwrite control data on the stack, which can lead to arbitrary code execution or complete device takeover. This flaw is based on classic buffer overflow weaknesses (CWE-119 and CWE-121) and has been confirmed to have a published exploit.
Affected Systems
The affected product is the D-Link DWR-M960 router with firmware version 1.01.07. Only this particular firmware release contains the vulnerable function and is therefore at risk.
Risk and Exploitability
The CVSS base score of 8.7 marks the issue as high severity, and the EPSS score of less than 1% indicates a low current exploitation probability, though a known exploit exists. The attack can be launched remotely by sending a crafted POST request to /boafrm/formLteSetup without the need for authentication, giving an attacker the ability to execute arbitrary code and potentially control the device.
OpenCVE Enrichment