D-Link Vulnerability (CVE-2026-2958)
CVE-2026-2958
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-base...
Overview
A critical security flaw has been identified in the D-Link DWR-M960 router firmware version 1.01.07. This vulnerability is a stack-based buffer overflow that can be exploited by a remote attacker without requiring authentication to the device.
Vulnerability Explanation
In simple terms, a specific function in the router’s web management interface does not properly check the size of data it receives. When a malicious actor sends an overly large amount of data to a particular setting field (the save_apply argument), it overflows a fixed-size memory buffer on the device’s stack. This corruption can allow the attacker to crash the device or, more critically, inject and execute their own malicious code.
Impact
The primary risk is that an unauthenticated attacker on the same network, or potentially from the internet if remote management is enabled, could exploit this flaw. Successful exploitation could lead to:
- Complete compromise of the router, granting the attacker administrative control.
- A denial-of-service condition, rendering the router inoperable.
- A foothold to launch further attacks against devices connected to the router’s network. The public disclosure of exploit details increases the likelihood of active attacks.
Remediation and Mitigation
Immediate action is required to protect affected devices.
1. Primary Remediation:
- Upgrade Firmware: Check the official D-Link support website for a firmware update that addresses CVE-2026-2958. If an update is available, apply it immediately. As of this advisory, version 1.01.07 is confirmed vulnerable; any newer version should be installed.
2. Critical Mitigation Steps (if no patch is available):
- Disable WPS/Wi-Fi Protected Setup: The vulnerable function is related to the WSC (Wi-Fi Simple Configuration) process. Disabling WPS in the router’s wireless settings may mitigate the attack vector. Note that this is a temporary workaround.
- Restrict Access: Ensure the router’s web-based management interface is not exposed to the internet (WAN). It should only be accessible from your local area network (LAN).
- Network Segmentation: Place the router on an isolated network segment if possible, limiting the potential lateral movement from a compromise.
General Advice: Monitor D-Link’s official security advisories for patching information. Consider replacing end-of-life hardware that no longer receives security updates.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument P...
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory....
A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The at...
A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. T...