High (8.8)

D-Link Vulnerability (CVE-2026-2958)

CVE-2026-2958

Stack buffer overflow in D-Link DWR-M960 firmware 1.01.07 grants unauthenticated remote code execution. Upgrade to patched firmware immediately.

Affected: Dlink Dwr-m960 Firmware Dlink Dwr-m960

Vendor-confirmed - CVE-2026-2958 is a high stack buffer overflow in D-Link DWR-M960 firmware 1.01.07 that grants unauthenticated remote code execution. Attackers can gain full administrative control of the router from the network or internet if remote management is enabled.

Overview

A critical security flaw has been identified in the D-Link DWR-M960 router firmware version 1.01.07. This vulnerability is a stack-based buffer overflow that can be exploited by a remote attacker without requiring authentication to the device.

Vulnerability Explanation

In simple terms, a specific function in the router’s web management interface does not properly check the size of data it receives. When a malicious actor sends an overly large amount of data to a particular setting field (the save_apply argument), it overflows a fixed-size memory buffer on the device’s stack. This corruption can allow the attacker to crash the device or, more critically, inject and execute their own malicious code.

Impact

The primary risk is that an unauthenticated attacker on the same network, or potentially from the internet if remote management is enabled, could exploit this flaw. Successful exploitation could lead to:

  • Complete compromise of the router, granting the attacker administrative control.
  • A denial-of-service condition, rendering the router inoperable.
  • A foothold to launch further attacks against devices connected to the router’s network. The public disclosure of exploit details increases the likelihood of active attacks.

Remediation and Mitigation

Immediate action is required to protect affected devices.

1. Primary Remediation:

  • Upgrade Firmware: Check the official D-Link support website for a firmware update that addresses CVE-2026-2958. If an update is available, apply it immediately. As of this advisory, version 1.01.07 is confirmed vulnerable; any newer version should be installed.

2. Critical Mitigation Steps (if no patch is available):

  • Disable WPS/Wi-Fi Protected Setup: The vulnerable function is related to the WSC (Wi-Fi Simple Configuration) process. Disabling WPS in the router’s wireless settings may mitigate the attack vector. Note that this is a temporary workaround.
  • Restrict Access: Ensure the router’s web-based management interface is not exposed to the internet (WAN). It should only be accessible from your local area network (LAN).
  • Network Segmentation: Place the router on an isolated network segment if possible, limiting the potential lateral movement from a compromise.

General Advice: Monitor D-Link’s official security advisories for patching information. Consider replacing end-of-life hardware that no longer receives security updates.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Dlink Dwr-m960 Firmware Vulnerabilities

View all Dlink Dwr-m960 Firmware vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.