D-Link Vulnerability (CVE-2026-2958)
CVE-2026-2958
Stack buffer overflow in D-Link DWR-M960 firmware 1.01.07 grants unauthenticated remote code execution. Upgrade to patched firmware immediately.
Vendor-confirmed - CVE-2026-2958 is a high stack buffer overflow in D-Link DWR-M960 firmware 1.01.07 that grants unauthenticated remote code execution. Attackers can gain full administrative control of the router from the network or internet if remote management is enabled.
Overview
A critical security flaw has been identified in the D-Link DWR-M960 router firmware version 1.01.07. This vulnerability is a stack-based buffer overflow that can be exploited by a remote attacker without requiring authentication to the device.
Vulnerability Explanation
In simple terms, a specific function in the router’s web management interface does not properly check the size of data it receives. When a malicious actor sends an overly large amount of data to a particular setting field (the save_apply argument), it overflows a fixed-size memory buffer on the device’s stack. This corruption can allow the attacker to crash the device or, more critically, inject and execute their own malicious code.
Impact
The primary risk is that an unauthenticated attacker on the same network, or potentially from the internet if remote management is enabled, could exploit this flaw. Successful exploitation could lead to:
- Complete compromise of the router, granting the attacker administrative control.
- A denial-of-service condition, rendering the router inoperable.
- A foothold to launch further attacks against devices connected to the router’s network. The public disclosure of exploit details increases the likelihood of active attacks.
Remediation and Mitigation
Immediate action is required to protect affected devices.
1. Primary Remediation:
- Upgrade Firmware: Check the official D-Link support website for a firmware update that addresses CVE-2026-2958. If an update is available, apply it immediately. As of this advisory, version 1.01.07 is confirmed vulnerable; any newer version should be installed.
2. Critical Mitigation Steps (if no patch is available):
- Disable WPS/Wi-Fi Protected Setup: The vulnerable function is related to the WSC (Wi-Fi Simple Configuration) process. Disabling WPS in the router’s wireless settings may mitigate the attack vector. Note that this is a temporary workaround.
- Restrict Access: Ensure the router’s web-based management interface is not exposed to the internet (WAN). It should only be accessible from your local area network (LAN).
- Network Segmentation: Place the router on an isolated network segment if possible, limiting the potential lateral movement from a compromise.
General Advice: Monitor D-Link’s official security advisories for patching information. Consider replacing end-of-life hardware that no longer receives security updates.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url re...
A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to sta...
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of ...
A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. Th...
Other Dlink Dwr-m960 Firmware Vulnerabilities
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url re...
A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to sta...
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of ...
A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. Th...