D-Link Vulnerability (CVE-2026-2959)
CVE-2026-2959
Unauthenticated remote attackers can hijack D-Link DWR-M960 routers via a stack buffer overflow in firmware 1.01.07. Update to the latest patched firmware immediately.
Vendor-confirmed - CVE-2026-2959 is a high stack buffer overflow in D-Link DWR-M960 router firmware 1.01.07 that grants unauthenticated remote attackers complete administrative control of the device. Public exploit code is available, increasing urgency for immediate firmware updates.
Security Advisory: Critical Buffer Overflow in D-Link DWR-M960 Router
Overview
A critical security vulnerability has been identified in the D-Link DWR-M960 router firmware version 1.01.07. This flaw is a stack-based buffer overflow located in the web management interface’s schedule form function. An attacker can remotely exploit this vulnerability by sending a specially crafted request to the router, potentially taking full control of the device. Public exploit code is available, significantly increasing the risk of active attacks.
Vulnerability Details
In simple terms, the router’s web interface contains a programming error when handling data for creating new schedules (like parental controls or timed access). A specific field meant for a URL does not properly check the length of the input it receives. By supplying an overly long string of code, an attacker can overflow a dedicated memory buffer (the “stack”). This overflow can corrupt the router’s normal operation and allow the attacker to execute their own malicious commands on the device.
Impact
If successfully exploited, this vulnerability could allow an unauthenticated, remote attacker to:
- Gain complete administrative control of the affected router.
- Intercept, modify, or redirect network traffic (enabling man-in-the-middle attacks).
- Install persistent malware or use the router as a foothold to attack other devices on the local network.
- Cause a denial of service, rendering the router inoperable.
The public availability of an exploit makes it likely that attackers will quickly scan for and target vulnerable devices.
Remediation and Mitigation
Immediate action is required to protect affected networks.
Primary Action: Update Firmware
- Check for Updates: Log in to your D-Link DWR-M960 router’s web administration panel.
- Navigate to Firmware: Go to the
ManagementorToolssection and selectFirmware Update. - Apply Patch: Check if D-Link has released a firmware version newer than 1.01.07. If an update is available, apply it immediately. This is the only complete solution.
Interim Mitigations (If No Patch is Available):
- Disable Remote Management: Ensure the “Remote Management” feature is turned OFF in the router’s administration settings (typically under
ManagementorAdmin). This prevents attackers from exploiting the flaw directly from the internet. - Use a Firewall: Restrict WAN-side access to the router’s web administration port (usually TCP 80 and 443) using an upstream firewall, if possible.
- Monitor for Updates: Regularly check the official D-Link support website for a security patch and apply it as soon as it is released.
General Recommendation: Until a firmware update is applied, consider the device vulnerable and monitor network traffic for any suspicious activity originating from the router itself.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-base...
A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to sta...
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of ...
A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. Th...
Other Dlink Dwr-m960 Firmware Vulnerabilities
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-base...
A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to sta...
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of ...
A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. Th...