Description
A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.
Published: 2026-02-23
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack‑based buffer overflow exists in the Scheduled Reboot Configuration Endpoint of the D‑Link DWR‑M960 router firmware 1.01.07. The function sub_460F30 in the /boafrm/formDateReboot component is vulnerable when an attacker manipulates the submit‑url argument, allowing a crafted request to overflow a stack buffer. This flaw can lead to execution of arbitrary code on the device and is classified in the CWE set 119 and 121.

Affected Systems

All units running D‑Link DWR‑M960 router models with firmware version 1.01.07 are affected. No other firmware revisions or nearby product lines are identified as vulnerable within the supplied information.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.7, indicating high severity, but the EPSS score is less than 1 %, suggesting a low current exploit probability. It is not listed in the KEV catalog. The endpoint is remotely accessible, meaning an attacker can trigger the overflow from outside the local network if the device is reachable. Publicly available exploits have been documented, increasing the likelihood that a determined adversary may target affected devices.

Generated by OpenCVE AI on April 18, 2026 at 11:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to a version that fixes the stack‑based overflow in the /boafrm/formDateReboot endpoint.
  • Limit exposure of the affected endpoint by disabling remote management or configuring firewall rules to restrict access to trusted IP addresses only.
  • Implement input validation or block malformed submit‑url requests using URL filtering, ensuring the buffer length is checked before processing the request.
  • If a firmware update is unavailable, consider disabling the scheduled reboot feature via local configuration to eliminate the vulnerable code path.

Generated by OpenCVE AI on April 18, 2026 at 11:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware
CPEs cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dwr-m960
Dlink dwr-m960 Firmware

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dwr-m960
Vendors & Products D-link
D-link dwr-m960

Mon, 23 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.
Title D-Link DWR-M960 Scheduled Reboot Configuration Endpoint formDateReboot sub_460F30 stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dwr-m960
Dlink Dwr-m960 Dwr-m960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T18:48:59.412Z

Reserved: 2026-02-22T07:19:29.329Z

Link: CVE-2026-2962

cve-icon Vulnrichment

Updated: 2026-02-23T18:48:51.658Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-23T01:16:17.923

Modified: 2026-02-23T19:22:52.810

Link: CVE-2026-2962

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:15:35Z

Weaknesses