D-Link Vulnerability (CVE-2026-2959)
CVE-2026-2959
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url re...
Security Advisory: Critical Buffer Overflow in D-Link DWR-M960 Router
Overview
A critical security vulnerability has been identified in the D-Link DWR-M960 router firmware version 1.01.07. This flaw is a stack-based buffer overflow located in the web management interface’s schedule form function. An attacker can remotely exploit this vulnerability by sending a specially crafted request to the router, potentially taking full control of the device. Public exploit code is available, significantly increasing the risk of active attacks.
Vulnerability Details
In simple terms, the router’s web interface contains a programming error when handling data for creating new schedules (like parental controls or timed access). A specific field meant for a URL does not properly check the length of the input it receives. By supplying an overly long string of code, an attacker can overflow a dedicated memory buffer (the “stack”). This overflow can corrupt the router’s normal operation and allow the attacker to execute their own malicious commands on the device.
Impact
If successfully exploited, this vulnerability could allow an unauthenticated, remote attacker to:
- Gain complete administrative control of the affected router.
- Intercept, modify, or redirect network traffic (enabling man-in-the-middle attacks).
- Install persistent malware or use the router as a foothold to attack other devices on the local network.
- Cause a denial of service, rendering the router inoperable.
The public availability of an exploit makes it likely that attackers will quickly scan for and target vulnerable devices.
Remediation and Mitigation
Immediate action is required to protect affected networks.
Primary Action: Update Firmware
- Check for Updates: Log in to your D-Link DWR-M960 router’s web administration panel.
- Navigate to Firmware: Go to the
ManagementorToolssection and selectFirmware Update. - Apply Patch: Check if D-Link has released a firmware version newer than 1.01.07. If an update is available, apply it immediately. This is the only complete solution.
Interim Mitigations (If No Patch is Available):
- Disable Remote Management: Ensure the “Remote Management” feature is turned OFF in the router’s administration settings (typically under
ManagementorAdmin). This prevents attackers from exploiting the flaw directly from the internet. - Use a Firewall: Restrict WAN-side access to the router’s web administration port (usually TCP 80 and 443) using an upstream firewall, if possible.
- Monitor for Updates: Regularly check the official D-Link support website for a security patch and apply it as soon as it is released.
General Recommendation: Until a firmware update is applied, consider the device vulnerable and monitor network traffic for any suspicious activity originating from the router itself.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument P...
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory....
A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The at...
A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. T...