Impact
A stack-based buffer overflow exists in the function sub_44E0F8 of the D-Link DWR‑M960 firmware’s /boafrm/formNewSchedule endpoint. By supplying a crafted url argument the attacker can overwrite the stack and execute arbitrary code, enabling full remote compromise of the device. This vulnerability corresponds to CWE‑119 and CWE‑121.
Affected Systems
The vulnerability affects D‑Link DWR‑M960 routers running firmware 1.01.07. No other firmware versions or models are listed as affected.
Risk and Exploitability
With a CVSS score of 8.7 the flaw is considered high severity. The EPSS score is less than 1 % indicating a low current exploitation probability, and the flaw is not yet listed in the CISA KEV catalog. However, a public exploit has been released and remote attackers can trigger the overflow by sending a specially crafted HTTP request to the router’s /boafrm/formNewSchedule endpoint from outside the local network. No special privileges are required beyond reach of the web interface, making the threat realistic for unprotected devices.
OpenCVE Enrichment