CVE-2026-2962
Plain English Summary
AI-powered analysis for quick understanding
An attacker can remotely exploit a vulnerability in the D-Link DWR-M960 router to execute arbitrary code by sending specially crafted data that causes a buffer overflow. This means they could potentially take control of the device if it is running the affected firmware version.
Technical Description
A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 23, 2026
about 1 month ago
Last Modified
Feb 23, 2026
about 1 month ago
Vendor
dlink
Product
dwr-m960 firmware
Related Vulnerabilities
This vulnerability allows an attacker to remotely execute malicious code on the D-Link DWR-M960 router by exploiting a flaw in its VPN configuration setup. The attacker needs to manipulate a specific part of the router's software, which could lead to unauthorized access and control over the device.
This vulnerability allows an attacker to remotely execute code on the D-Link DWR-M960 router by exploiting a flaw in its firmware, which can lead to a crash or unauthorized access. The attacker needs to manipulate a specific URL parameter to trigger the issue, making it a significant risk for users of this device.
This vulnerability allows an attacker to remotely take control of the D-Link DWR-M960 router by exploiting a flaw in its scheduling feature, which can lead to unauthorized access or manipulation of the device. The attacker needs to send specially crafted data to the router, making it possible for them to execute malicious code.
An attacker can remotely exploit a vulnerability in the D-Link DWR-M960 router to execute arbitrary code by causing a buffer overflow, which could allow them to take control of the device. This attack requires the attacker to send specially crafted data to the router's firmware, making it critical to update the device as soon as possible to prevent exploitation.
An attacker can remotely exploit a flaw in the D-Link DWR-M960 router's firmware to cause a stack-based buffer overflow, potentially allowing them to execute malicious code on the device. This vulnerability requires the attacker to manipulate a specific URL parameter, making it relatively easy to exploit if the router is accessible over the internet.