High (8.8)

D-Link Vulnerability (CVE-2026-2959)

CVE-2026-2959

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url re...

Overview

A critical security vulnerability has been identified in the D-Link DWR-M960 router firmware version 1.01.07. This flaw is a stack-based buffer overflow located in the web management interface’s schedule form function. An attacker can remotely exploit this vulnerability by sending a specially crafted request to the router, potentially taking full control of the device. Public exploit code is available, significantly increasing the risk of active attacks.

Vulnerability Details

In simple terms, the router’s web interface contains a programming error when handling data for creating new schedules (like parental controls or timed access). A specific field meant for a URL does not properly check the length of the input it receives. By supplying an overly long string of code, an attacker can overflow a dedicated memory buffer (the “stack”). This overflow can corrupt the router’s normal operation and allow the attacker to execute their own malicious commands on the device.

Impact

If successfully exploited, this vulnerability could allow an unauthenticated, remote attacker to:

  • Gain complete administrative control of the affected router.
  • Intercept, modify, or redirect network traffic (enabling man-in-the-middle attacks).
  • Install persistent malware or use the router as a foothold to attack other devices on the local network.
  • Cause a denial of service, rendering the router inoperable.

The public availability of an exploit makes it likely that attackers will quickly scan for and target vulnerable devices.

Remediation and Mitigation

Immediate action is required to protect affected networks.

Primary Action: Update Firmware

  1. Check for Updates: Log in to your D-Link DWR-M960 router’s web administration panel.
  2. Navigate to Firmware: Go to the Management or Tools section and select Firmware Update.
  3. Apply Patch: Check if D-Link has released a firmware version newer than 1.01.07. If an update is available, apply it immediately. This is the only complete solution.

Interim Mitigations (If No Patch is Available):

  • Disable Remote Management: Ensure the “Remote Management” feature is turned OFF in the router’s administration settings (typically under Management or Admin). This prevents attackers from exploiting the flaw directly from the internet.
  • Use a Firewall: Restrict WAN-side access to the router’s web administration port (usually TCP 80 and 443) using an upstream firewall, if possible.
  • Monitor for Updates: Regularly check the official D-Link support website for a security patch and apply it as soon as it is released.

General Recommendation: Until a firmware update is applied, consider the device vulnerable and monitor network traffic for any suspicious activity originating from the router itself.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.