Description
A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_452CCC of the file /boafrm/formWlEncrypt of the component WLAN Encryption Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
Published: 2026-02-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote stack-based buffer overflow leading to code execution
Action: Patch immediately
AI Analysis

Impact

The vulnerability resides in the sub_452CCC function of the WLAN Encryption Configuration Endpoint (formWlEncrypt) on D-Link DWR‑M960 routers. A crafted submit‑url parameter can overflow a local stack buffer, allowing the attacker to overwrite control data, and if successfully exploited, the attacker can achieve arbitrary code execution on the device, compromising confidentiality, integrity, and availability.

Affected Systems

Affected devices are D-Link DWR‑M960 routers running firmware 1.01.07. The manufacturer is D-Link. No additional versions are specified, so any fleet of this model with the affected firmware is vulnerable.

Risk and Exploitability

The CVSS base score of 8.7 reflects a high severity. The EPSS score indicates a very low current exploitation probability (<1%), and the vulnerability is not yet listed in CISA’s KEV catalog. Nevertheless, the exploit is publicly available, and because the attack vector is remote, the potential impact is significant. Successful exploitation would give the attacker full control over the router, enabling network compromise or further lateral movement.

Generated by OpenCVE AI on April 16, 2026 at 16:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official firmware update that removes the buffer overflow flaw (e.g., upgrade to firmware 1.01.08 or later if available).
  • If an update is not immediately available, block or disable the WLAN Encryption Configuration Endpoint or the submit‑url functionality, or restrict access to the management interface to trusted IPs only.
  • Conduct a network perimeter audit to ensure no other remote management interfaces are exposed, and monitor for anomalous traffic targeting the router.

Generated by OpenCVE AI on April 16, 2026 at 16:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Sun, 22 Feb 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_452CCC of the file /boafrm/formWlEncrypt of the component WLAN Encryption Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
Title D-Link DWR-M960 WLAN Encryption Configuration Endpoint formWlEncrypt sub_452CCC stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T18:12:06.940Z

Reserved: 2026-02-21T04:58:36.992Z

Link: CVE-2026-2928

cve-icon Vulnrichment

Updated: 2026-02-27T18:12:03.004Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T05:16:19.303

Modified: 2026-02-23T19:29:03.767

Link: CVE-2026-2928

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:45:25Z

Weaknesses