D-Link Vulnerability (CVE-2026-2960)
CVE-2026-2960
D-Link DWR-M960 v1.01.07 stack buffer overflow in DHCPv6 grants remote unauthenticated attackers full device takeover with public exploit. Update to latest firmware.
Vendor-confirmed - CVE-2026-2960 is a high-severity stack-based buffer overflow in D-Link DWR-M960 router firmware version 1.01.07 that grants remote unauthenticated attackers full device compromise and network infiltration. A public exploit is available, requiring immediate firmware upgrade.
Overview
A high-severity security vulnerability has been identified in a specific D-Link router model. This flaw could allow a remote attacker to execute malicious code on the device by sending a specially crafted network request, potentially leading to a complete system compromise.
Vulnerability Details
The vulnerability exists in the firmware of the D-Link DWR-M960 router, version 1.01.07. Specifically, a function responsible for handling DHCPv6 (a common network configuration protocol) contains a critical programming error known as a stack-based buffer overflow.
In simple terms, a component of the router’s web interface does not properly check the size of data it receives. By sending an overly long, manipulated request to a specific form (formDhcpv6s), an attacker can overflow a memory buffer. This overflow can corrupt the router’s normal process execution and allow the attacker to run their own code on the device.
Impact
If successfully exploited, this vulnerability can have severe consequences:
- Full Device Compromise: An attacker could gain complete control over the router.
- Network Infiltration: The compromised router could be used to intercept, redirect, or inspect all traffic passing through it (like passwords, emails, and browsing data).
- Persistence: Attackers could install backdoors to maintain access even after a reboot.
- Launching Further Attacks: The router could be used as a foothold to attack other devices on the local network or to launch attacks against external internet targets.
Important Note: A functional exploit for this vulnerability has been made publicly available, significantly increasing the risk of active attacks.
Remediation and Mitigation
Immediate action is required for users and administrators of the affected device.
Primary Solution - Firmware Update:
- Check for Updates: Log in to your DWR-M960 router’s web administration interface.
- Navigate to Firmware Upgrade: This is typically found under “System Tools,” “Management,” or a similar menu.
- Install Official Firmware: Upgrade the firmware to a version newer than 1.01.07 as soon as D-Link makes it available. Monitor the official D-Link support website for the security-fixed release.
Immediate Mitigations (If Update is Not Yet Available):
- Disable WAN Management: Ensure the router’s administrative interface is not accessible from the internet (the WAN side). This setting is usually found under “Remote Management” in the admin panel.
- Use Strong Credentials: Change the router’s default administrator password to a unique, complex password.
- Network Segmentation: If possible, place sensitive devices on a separate network segment or VLAN.
- Monitor for Compromise: Watch for unusual router behavior, such as settings changing on their own, slow performance, or unknown devices listed in the DHCP client table.
Until a patched firmware version is installed, these devices should be considered at high risk.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-base...
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url re...
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of ...
A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. Th...
Other Dlink Dwr-m960 Firmware Vulnerabilities
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-base...
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url re...
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of ...
A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. Th...