High (8.8)

D-Link Vulnerability (CVE-2026-2960)

CVE-2026-2960

A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to sta...

Overview

A high-severity security vulnerability has been identified in a specific D-Link router model. This flaw could allow a remote attacker to execute malicious code on the device by sending a specially crafted network request, potentially leading to a complete system compromise.

Vulnerability Details

The vulnerability exists in the firmware of the D-Link DWR-M960 router, version 1.01.07. Specifically, a function responsible for handling DHCPv6 (a common network configuration protocol) contains a critical programming error known as a stack-based buffer overflow.

In simple terms, a component of the router’s web interface does not properly check the size of data it receives. By sending an overly long, manipulated request to a specific form (formDhcpv6s), an attacker can overflow a memory buffer. This overflow can corrupt the router’s normal process execution and allow the attacker to run their own code on the device.

Impact

If successfully exploited, this vulnerability can have severe consequences:

  • Full Device Compromise: An attacker could gain complete control over the router.
  • Network Infiltration: The compromised router could be used to intercept, redirect, or inspect all traffic passing through it (like passwords, emails, and browsing data).
  • Persistence: Attackers could install backdoors to maintain access even after a reboot.
  • Launching Further Attacks: The router could be used as a foothold to attack other devices on the local network or to launch attacks against external internet targets.

Important Note: A functional exploit for this vulnerability has been made publicly available, significantly increasing the risk of active attacks.

Remediation and Mitigation

Immediate action is required for users and administrators of the affected device.

Primary Solution - Firmware Update:

  1. Check for Updates: Log in to your DWR-M960 router’s web administration interface.
  2. Navigate to Firmware Upgrade: This is typically found under “System Tools,” “Management,” or a similar menu.
  3. Install Official Firmware: Upgrade the firmware to a version newer than 1.01.07 as soon as D-Link makes it available. Monitor the official D-Link support website for the security-fixed release.

Immediate Mitigations (If Update is Not Yet Available):

  • Disable WAN Management: Ensure the router’s administrative interface is not accessible from the internet (the WAN side). This setting is usually found under “Remote Management” in the admin panel.
  • Use Strong Credentials: Change the router’s default administrator password to a unique, complex password.
  • Network Segmentation: If possible, place sensitive devices on a separate network segment or VLAN.
  • Monitor for Compromise: Watch for unusual router behavior, such as settings changing on their own, slow performance, or unknown devices listed in the DHCP client table.

Until a patched firmware version is installed, these devices should be considered at high risk.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.