Description
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-02-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Stack‑Based Buffer Overflow enabling potential code execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the sub_457C5C function within the /boafrm/formWsc file of D-Link DWR‑M960 firmware 1.01.07. By manipulating the save_apply argument, an attacker can trigger a stack‑based buffer overflow, which may lead to remote code execution. This weakness is classified as both CWE‑119 and CWE‑121, indicating unsafe handling of untrusted input and stack manipulation errors.

Affected Systems

The affected product is the D‑Link DWR‑M960 router running firmware version 1.01.07. No other versions or models are currently listed as vulnerable, and only this firmware variant appears in the public references.

Risk and Exploitability

The CVSS score of 8.7 marks this as a high‑severity flaw, while the EPSS score is less than 1% indicating a low but non‑zero probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it remotely via the web interface, and the publicly disclosed exploit suggests that it could be weaponized in realistic threat environments.

Generated by OpenCVE AI on April 17, 2026 at 16:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the D‑Link DWR‑M960 firmware to a version that resolves the buffer overflow.
  • If an update is not available, disable or lock down the Web‑based WSC interface to prevent remote manipulation of the save_apply argument.
  • Continuously monitor device logs for attempts to access the formWsc endpoint and for signs of exploitation attempts.

Generated by OpenCVE AI on April 17, 2026 at 16:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Sun, 22 Feb 2026 23:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Title D-Link DWR-M960 formWsc sub_457C5C stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T21:05:58.040Z

Reserved: 2026-02-22T07:19:12.832Z

Link: CVE-2026-2958

cve-icon Vulnrichment

Updated: 2026-02-23T21:05:50.080Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-23T00:16:00.377

Modified: 2026-02-23T19:38:46.837

Link: CVE-2026-2958

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:30:05Z

Weaknesses