D-Link Vulnerability (CVE-2026-2881)
CVE-2026-2881
Vendor-confirmed CVE-2026-2881 grants unauthenticated remote code execution on D-Link DWR-M960 routers via a stack buffer overflow in the firewall config page. Update to patched firmware immediately.
Vendor-confirmed - CVE-2026-2881 is a high severity unauthenticated remote code execution vulnerability in D-Link DWR-M960 router firmware version 1.01.07 that allows an attacker to overflow a buffer in the advanced firewall settings and execute arbitrary code on the device. A public exploit is available, so users should immediately apply a firmware patch from D-Link.
Overview
A high-severity security vulnerability has been identified in the D-Link DWR-M960 router firmware version 1.01.07. This flaw is a stack-based buffer overflow located within the router’s web management interface, specifically in the advanced firewall configuration section. An attacker can exploit this vulnerability by sending specially crafted network requests to the device.
Vulnerability Details
In simple terms, the router’s software contains a programming error in the code that handles the advanced firewall settings. This error does not properly check the size of data being processed. By sending an overly long, malicious string of data to a specific part of the router’s web interface (the submit-url parameter), an attacker can overflow a memory buffer. This overflow can corrupt the router’s normal operation and potentially allow the attacker to run their own malicious code on the device.
The attack can be performed remotely over the internet or a local network, and a functional exploit has been made publicly available, significantly increasing the risk.
Potential Impact
If successfully exploited, this vulnerability could allow an unauthenticated remote attacker to:
- Take control of the router, enabling them to change settings, intercept network traffic, or disable security features.
- Use the compromised router as a foothold to launch further attacks against other devices on the internal network (like computers, phones, or servers).
- Cause a denial-of-service (DoS), crashing the router and rendering the internet connection unusable until the device is rebooted.
Remediation and Mitigation
Immediate action is required for users of the affected device.
Primary Solution: Update Firmware
- Check for Updates: Log in to your DWR-M960 router’s web management interface and navigate to the firmware update section.
- Apply the Patch: Install the latest official firmware version provided by D-Link. As of this advisory, version 1.01.07 is vulnerable. Contact D-Link support to confirm when a patched firmware version (e.g., 1.01.08 or higher) is released and apply it immediately.
Interim Mitigations (If No Patch is Available):
- Restrict Access: If possible, configure your firewall to block external WAN (internet) access to the router’s web management interface (ports 80/HTTP and 443/HTTPS). It should only be accessed from your local, trusted network.
- Monitor for Updates: Frequently check the official D-Link support website for security advisories and firmware updates for the DWR-M960 model.
General Best Practice: Always ensure your network devices, especially internet-facing routers, are running the latest manufacturer-provided firmware to protect against known security flaws.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-base...
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url re...
A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to sta...
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of ...
Other Dlink Dwr-m960 Firmware Vulnerabilities
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-base...
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url re...
A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to sta...
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of ...