High (8.8)

D-Link Vulnerability (CVE-2026-2962)

CVE-2026-2962

CVE-2026-2962 grants remote unauthenticated attackers full router control via buffer overflow on D-Link DWR-M960 firmware 1.01.07. Update firmware immediately.

Affected: Dlink Dwr-m960 Firmware Dlink Dwr-m960

Vendor-confirmed - CVE-2026-2962 is a high-severity remote code execution vulnerability in the D-Link DWR-M960 router firmware 1.01.07 that lets an unauthenticated attacker send a crafted string to the Scheduled Reboot page, triggering a stack-based buffer overflow to seize full device control. Update to patched firmware now.

Overview

A critical security flaw has been identified in the D-Link DWR-M960 router, firmware version 1.01.07. This vulnerability allows a remote attacker to potentially take control of the device by sending specially crafted data to its web management interface.

Vulnerability Details

The weakness exists in the router’s Scheduled Reboot configuration page. A specific function responsible for processing data does not properly validate the length of input it receives. By sending an overly long string of characters in a network request, an attacker can trigger a “stack-based buffer overflow.” This corrupts the router’s memory and can allow the attacker to run their own malicious code on the device.

Importantly, this attack can be launched remotely over the internet or a local network, and a public proof-of-concept exploit exists, increasing the immediate risk.

Potential Impact

If successfully exploited, this high-severity vulnerability could allow an attacker to:

  • Gain full control of the affected router.
  • Intercept, modify, or redirect network traffic (enabling data theft or malware distribution).
  • Disrupt network connectivity by disabling the router.
  • Use the compromised device as a foothold for attacks on other devices within the network.

Remediation and Mitigation

Immediate action is required for users of the D-Link DWR-M960 router running firmware version 1.01.07.

Primary Action: Update Firmware

  1. Check the official D-Link support website for a firmware update that addresses CVE-2026-2962.
  2. If an update is available, install it immediately. This is the only complete solution.

Interim Mitigations (If No Patch is Available):

  • Disable Remote Management: Ensure the router’s web management interface is not accessible from the internet (WAN). This setting is typically found under “Administration” or “Remote Management” in the router’s settings.
  • Use Strong Network Segmentation: Place critical devices on a separate network VLAN, if possible, to limit the blast radius of a potential compromise.
  • Monitor Network Traffic: Be alert for unusual outbound connections or traffic spikes originating from the router itself.

General Advice: As a best practice, always keep router firmware updated and avoid exposing administrative interfaces to the public internet.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Dlink Dwr-m960 Firmware Vulnerabilities

View all Dlink Dwr-m960 Firmware vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.