Description
A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the component Operation Mode Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-02-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via stack-based buffer overflow
Action: Patch
AI Analysis

Impact

The vulnerability in the D-Link DWR-M960 firmware 1.01.07 allows an attacker to send a crafted submit-url parameter to the /boafrm/formOpMode endpoint. The manipulation triggers a stack-based buffer overflow that can lead to arbitrary code execution on the device. By exploiting the flaw, an attacker can compromise the confidentiality, integrity, and availability of the device and potentially launch further attacks within the network.

Affected Systems

D-Link DWR-M960 router running firmware version 1.01.07. No other products or versions are listed as affected.

Risk and Exploitability

The flaw carries a CVSS score of 8.7, indicating a high severity. The EPSS score is below 1%, suggesting a low exploitation probability but not impossible. The vulnerability is not currently listed in the CISA KEV catalog, and no known public exploits are confirmed. The exploit can be initiated remotely, as stated in the description, meaning any host able to reach the vulnerable endpoint could potentially launch an attack.

Generated by OpenCVE AI on April 17, 2026 at 16:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the D-Link DWR-M960 firmware to a version that includes the stack buffer overflow fix, if an update is available.
  • If no firmware update is available, block or restrict access to the /boafrm/formOpMode endpoint using network segmentation, firewall rules, or disabling the Operation Mode Configuration service.
  • Monitor the router for anomalous activity and logs that may indicate exploitation attempts.

Generated by OpenCVE AI on April 17, 2026 at 16:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Sun, 22 Feb 2026 05:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the component Operation Mode Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Title D-Link DWR-M960 Operation Mode Configuration Endpoint formOpMode sub_462590 stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-26T16:25:58.478Z

Reserved: 2026-02-21T04:58:33.810Z

Link: CVE-2026-2927

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T05:16:19.087

Modified: 2026-02-23T19:29:59.560

Link: CVE-2026-2927

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:45:15Z

Weaknesses