D-Link Vulnerability (CVE-2026-2962)
CVE-2026-2962
A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. Th...
Overview
A critical security flaw has been identified in the D-Link DWR-M960 router, firmware version 1.01.07. This vulnerability allows a remote attacker to potentially take control of the device by sending specially crafted data to its web management interface.
Vulnerability Details
The weakness exists in the router’s Scheduled Reboot configuration page. A specific function responsible for processing data does not properly validate the length of input it receives. By sending an overly long string of characters in a network request, an attacker can trigger a “stack-based buffer overflow.” This corrupts the router’s memory and can allow the attacker to run their own malicious code on the device.
Importantly, this attack can be launched remotely over the internet or a local network, and a public proof-of-concept exploit exists, increasing the immediate risk.
Potential Impact
If successfully exploited, this high-severity vulnerability could allow an attacker to:
- Gain full control of the affected router.
- Intercept, modify, or redirect network traffic (enabling data theft or malware distribution).
- Disrupt network connectivity by disabling the router.
- Use the compromised device as a foothold for attacks on other devices within the network.
Remediation and Mitigation
Immediate action is required for users of the D-Link DWR-M960 router running firmware version 1.01.07.
Primary Action: Update Firmware
- Check the official D-Link support website for a firmware update that addresses CVE-2026-2962.
- If an update is available, install it immediately. This is the only complete solution.
Interim Mitigations (If No Patch is Available):
- Disable Remote Management: Ensure the router’s web management interface is not accessible from the internet (WAN). This setting is typically found under “Administration” or “Remote Management” in the router’s settings.
- Use Strong Network Segmentation: Place critical devices on a separate network VLAN, if possible, to limit the blast radius of a potential compromise.
- Monitor Network Traffic: Be alert for unusual outbound connections or traffic spikes originating from the router itself.
General Advice: As a best practice, always keep router firmware updated and avoid exposing administrative interfaces to the public internet.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument P...
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory....
A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The at...
A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. T...