Description
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.
Published: 2026-02-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via stack-based buffer overflow
Action: Patch ASAP
AI Analysis

Impact

A stack-based buffer overflow exists in the function sub_44E0F8 of the D-Link DWR‑M960 firmware’s /boafrm/formNewSchedule endpoint. By supplying a crafted url argument the attacker can overwrite the stack and execute arbitrary code, enabling full remote compromise of the device. This vulnerability corresponds to CWE‑119 and CWE‑121.

Affected Systems

The vulnerability affects D‑Link DWR‑M960 routers running firmware 1.01.07. No other firmware versions or models are listed as affected.

Risk and Exploitability

With a CVSS score of 8.7 the flaw is considered high severity. The EPSS score is less than 1 % indicating a low current exploitation probability, and the flaw is not yet listed in the CISA KEV catalog. However, a public exploit has been released and remote attackers can trigger the overflow by sending a specially crafted HTTP request to the router’s /boafrm/formNewSchedule endpoint from outside the local network. No special privileges are required beyond reach of the web interface, making the threat realistic for unprotected devices.

Generated by OpenCVE AI on April 17, 2026 at 16:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the latest firmware from the D‑Link website that resolves the buffer overflow.
  • Limit administrative access to the router by restricting the web interface to trusted internal networks or by placing the device on a separate VLAN.
  • Continuously monitor router logs for anomalous HTTP requests targeting /boafrm/formNewSchedule and other management endpoints.
  • If a firmware update is not available, consider disabling the web management interface entirely or replacing the device.

Generated by OpenCVE AI on April 17, 2026 at 16:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Sun, 22 Feb 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.
Title D-Link DWR-M960 formNewSchedule sub_44E0F8 stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T21:01:19.146Z

Reserved: 2026-02-22T07:19:20.670Z

Link: CVE-2026-2959

cve-icon Vulnrichment

Updated: 2026-02-23T21:01:13.722Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-23T00:16:00.697

Modified: 2026-02-23T19:28:20.650

Link: CVE-2026-2959

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:30:05Z

Weaknesses