D-Link Vulnerability (CVE-2026-2853)
CVE-2026-2853
Remote unauthenticated attacker can execute arbitrary code via stack overflow in D-Link DWR-M960 router firmware 1.01.07. Patch immediately.
Vendor-confirmed - CVE-2026-2853 is a high-severity stack-based buffer overflow in D-Link DWR-M960 router firmware 1.01.07 that grants unauthenticated remote code execution. Apply the latest firmware patch from D-Link immediately.
Security Advisory: Critical Buffer Overflow in D-Link DWR-M960 Router
Overview
A critical security vulnerability has been identified in the D-Link DWR-M960 router, firmware version 1.01.07. The flaw exists within the web interface page used to configure system logs. Specifically, a remote attacker can send a specially crafted request to a vulnerable component, causing a stack-based buffer overflow. This type of vulnerability occurs when a program writes more data to a memory buffer than it can hold, corrupting adjacent memory.
Vulnerability Details
The issue is located in the formSysLog function of the router’s administrative web interface. By manipulating the submit-url parameter in a network request, an attacker can trigger the overflow. The vulnerability is remotely exploitable, meaning an attacker does not need physical access or a local network account to attempt an attack. Publicly available exploit code increases the risk of immediate, widespread exploitation.
Impact
Successful exploitation of this high-severity vulnerability (CVSS: 8.8) could allow an unauthenticated, remote attacker to execute arbitrary code on the affected router. This could lead to a complete compromise of the device, resulting in:
- A persistent foothold within your network.
- Interception or redirection of network traffic (man-in-the-middle attacks).
- Disruption of internet service (Denial of Service).
- Use of the router as a launch point for attacks on other internal devices.
Affected Products
- D-Link DWR-M960 router running firmware version 1.01.07. Other firmware versions may also be affected and should be verified.
Remediation and Mitigation
Immediate action is required to protect affected networks.
Primary Action: Update Firmware
- Check for Updates: Log in to your D-Link DWR-M960 router’s web administration interface.
- Navigate to Firmware Update: Typically found under
MaintenanceorTools. - Install Official Patch: Apply the latest firmware update provided by D-Link. If version 1.01.07 is the latest, monitor the D-Link Security Advisory page diligently for a patched release and apply it immediately upon availability.
Interim Mitigations (If No Patch is Available):
- Restrict Access: If possible, configure firewall rules to restrict access to the router’s web administration interface (typically TCP ports 80 and 443) to only trusted, necessary administrative IP addresses. Do not expose this interface to the public internet.
- Monitor for Compromise: Be alert for unusual network activity, such as unexpected configuration changes, new port forwards, or unknown devices on the network.
General Recommendation: As a best practice, ensure all network equipment is regularly updated and its management interfaces are not exposed to untrusted networks.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-base...
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url re...
A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to sta...
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of ...
Other Dlink Dwr-m960 Firmware Vulnerabilities
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-base...
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url re...
A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to sta...
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of ...