D-Link Vulnerability (CVE-2026-2960)
CVE-2026-2960
A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to sta...
Overview
A high-severity security vulnerability has been identified in a specific D-Link router model. This flaw could allow a remote attacker to execute malicious code on the device by sending a specially crafted network request, potentially leading to a complete system compromise.
Vulnerability Details
The vulnerability exists in the firmware of the D-Link DWR-M960 router, version 1.01.07. Specifically, a function responsible for handling DHCPv6 (a common network configuration protocol) contains a critical programming error known as a stack-based buffer overflow.
In simple terms, a component of the router’s web interface does not properly check the size of data it receives. By sending an overly long, manipulated request to a specific form (formDhcpv6s), an attacker can overflow a memory buffer. This overflow can corrupt the router’s normal process execution and allow the attacker to run their own code on the device.
Impact
If successfully exploited, this vulnerability can have severe consequences:
- Full Device Compromise: An attacker could gain complete control over the router.
- Network Infiltration: The compromised router could be used to intercept, redirect, or inspect all traffic passing through it (like passwords, emails, and browsing data).
- Persistence: Attackers could install backdoors to maintain access even after a reboot.
- Launching Further Attacks: The router could be used as a foothold to attack other devices on the local network or to launch attacks against external internet targets.
Important Note: A functional exploit for this vulnerability has been made publicly available, significantly increasing the risk of active attacks.
Remediation and Mitigation
Immediate action is required for users and administrators of the affected device.
Primary Solution - Firmware Update:
- Check for Updates: Log in to your DWR-M960 router’s web administration interface.
- Navigate to Firmware Upgrade: This is typically found under “System Tools,” “Management,” or a similar menu.
- Install Official Firmware: Upgrade the firmware to a version newer than 1.01.07 as soon as D-Link makes it available. Monitor the official D-Link support website for the security-fixed release.
Immediate Mitigations (If Update is Not Yet Available):
- Disable WAN Management: Ensure the router’s administrative interface is not accessible from the internet (the WAN side). This setting is usually found under “Remote Management” in the admin panel.
- Use Strong Credentials: Change the router’s default administrator password to a unique, complex password.
- Network Segmentation: If possible, place sensitive devices on a separate network segment or VLAN.
- Monitor for Compromise: Watch for unusual router behavior, such as settings changing on their own, slow performance, or unknown devices listed in the DHCP client table.
Until a patched firmware version is installed, these devices should be considered at high risk.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument P...
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory....
A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The at...
A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. T...