Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink dwr-m960 Dlink dwr-m960 Firmware |
|
| CPEs | cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:* cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink dwr-m960 Dlink dwr-m960 Firmware |
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link dwr-m960 |
|
| Vendors & Products |
D-link
D-link dwr-m960 |
Mon, 23 Feb 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. | |
| Title | D-Link DWR-M960 VPN Configuration Endpoint formVpnConfigSetup sub_4196C4 stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T19:14:25.184Z
Reserved: 2026-02-22T07:19:26.067Z
Link: CVE-2026-2961
Updated: 2026-02-23T19:14:17.496Z
Status : Analyzed
Published: 2026-02-23T01:16:17.720
Modified: 2026-02-23T19:23:59.010
Link: CVE-2026-2961
No data.
OpenCVE Enrichment
Updated: 2026-02-23T14:28:33Z