Description
A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.
Published: 2026-02-23
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow can be triggered by manipulating the submit-url parameter in the formDhcpv6s module of a D-Link DWR-M960 router. An attacker exploiting this flaw can cause a stack overflow and achieve arbitrary code execution on the device from a remote location, compromising its confidentiality, integrity, and availability.

Affected Systems

The vulnerability affects D-Link DWR-M960 routers running firmware 1.01.07. Any device that has not applied a subsequent firmware update that addresses the sub_468D64 function is susceptible to exploitation.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity vulnerability, while the EPSS score of less than 1% suggests a low current exploitation probability. The flaw is not listed in CISA’s KEV catalog, but the published exploit demonstrates that remote attacks are feasible. Attackers only need remote network access to craft a malicious submit-url request, making the exploit straightforward once the vulnerability is known.

Generated by OpenCVE AI on April 17, 2026 at 16:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to the latest firmware version released by D-Link that fixes the sub_468D64 buffer overflow.
  • Block or restrict remote access to the router’s management interface, ensuring only trusted internal users can reach management services.
  • Disable or remove any unused remote management features, such as the web service or remote DHCPv6 handling, to reduce the attack surface while awaiting an official patch.

Generated by OpenCVE AI on April 17, 2026 at 16:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Mon, 23 Feb 2026 00:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.
Title D-Link DWR-M960 formDhcpv6s sub_468D64 stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T20:32:28.136Z

Reserved: 2026-02-22T07:19:23.387Z

Link: CVE-2026-2960

cve-icon Vulnrichment

Updated: 2026-02-23T20:32:22.616Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-23T01:16:17.500

Modified: 2026-02-23T19:24:49.953

Link: CVE-2026-2960

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:30:05Z

Weaknesses