High (8.8)

D-Link Vulnerability (CVE-2026-2853)

CVE-2026-2853

A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the function sub_462E14 of the file /boafrm/formSysLog of the component System Log Configuration Endpoint. Performing a manipulati...

Overview

A critical security vulnerability has been identified in the D-Link DWR-M960 router, firmware version 1.01.07. The flaw exists within the web interface page used to configure system logs. Specifically, a remote attacker can send a specially crafted request to a vulnerable component, causing a stack-based buffer overflow. This type of vulnerability occurs when a program writes more data to a memory buffer than it can hold, corrupting adjacent memory.

Vulnerability Details

The issue is located in the formSysLog function of the router’s administrative web interface. By manipulating the submit-url parameter in a network request, an attacker can trigger the overflow. The vulnerability is remotely exploitable, meaning an attacker does not need physical access or a local network account to attempt an attack. Publicly available exploit code increases the risk of immediate, widespread exploitation.

Impact

Successful exploitation of this high-severity vulnerability (CVSS: 8.8) could allow an unauthenticated, remote attacker to execute arbitrary code on the affected router. This could lead to a complete compromise of the device, resulting in:

  • A persistent foothold within your network.
  • Interception or redirection of network traffic (man-in-the-middle attacks).
  • Disruption of internet service (Denial of Service).
  • Use of the router as a launch point for attacks on other internal devices.

Affected Products

  • D-Link DWR-M960 router running firmware version 1.01.07. Other firmware versions may also be affected and should be verified.

Remediation and Mitigation

Immediate action is required to protect affected networks.

Primary Action: Update Firmware

  1. Check for Updates: Log in to your D-Link DWR-M960 router’s web administration interface.
  2. Navigate to Firmware Update: Typically found under Maintenance or Tools.
  3. Install Official Patch: Apply the latest firmware update provided by D-Link. If version 1.01.07 is the latest, monitor the D-Link Security Advisory page diligently for a patched release and apply it immediately upon availability.

Interim Mitigations (If No Patch is Available):

  • Restrict Access: If possible, configure firewall rules to restrict access to the router’s web administration interface (typically TCP ports 80 and 443) to only trusted, necessary administrative IP addresses. Do not expose this interface to the public internet.
  • Monitor for Compromise: Be alert for unusual network activity, such as unexpected configuration changes, new port forwards, or unknown devices on the network.

General Recommendation: As a best practice, ensure all network equipment is regularly updated and its management interfaces are not exposed to untrusted networks.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.