D-Link Vulnerability (CVE-2026-2962)
CVE-2026-2962
CVE-2026-2962 grants remote unauthenticated attackers full router control via buffer overflow on D-Link DWR-M960 firmware 1.01.07. Update firmware immediately.
Vendor-confirmed - CVE-2026-2962 is a high-severity remote code execution vulnerability in the D-Link DWR-M960 router firmware 1.01.07 that lets an unauthenticated attacker send a crafted string to the Scheduled Reboot page, triggering a stack-based buffer overflow to seize full device control. Update to patched firmware now.
Overview
A critical security flaw has been identified in the D-Link DWR-M960 router, firmware version 1.01.07. This vulnerability allows a remote attacker to potentially take control of the device by sending specially crafted data to its web management interface.
Vulnerability Details
The weakness exists in the router’s Scheduled Reboot configuration page. A specific function responsible for processing data does not properly validate the length of input it receives. By sending an overly long string of characters in a network request, an attacker can trigger a “stack-based buffer overflow.” This corrupts the router’s memory and can allow the attacker to run their own malicious code on the device.
Importantly, this attack can be launched remotely over the internet or a local network, and a public proof-of-concept exploit exists, increasing the immediate risk.
Potential Impact
If successfully exploited, this high-severity vulnerability could allow an attacker to:
- Gain full control of the affected router.
- Intercept, modify, or redirect network traffic (enabling data theft or malware distribution).
- Disrupt network connectivity by disabling the router.
- Use the compromised device as a foothold for attacks on other devices within the network.
Remediation and Mitigation
Immediate action is required for users of the D-Link DWR-M960 router running firmware version 1.01.07.
Primary Action: Update Firmware
- Check the official D-Link support website for a firmware update that addresses CVE-2026-2962.
- If an update is available, install it immediately. This is the only complete solution.
Interim Mitigations (If No Patch is Available):
- Disable Remote Management: Ensure the router’s web management interface is not accessible from the internet (WAN). This setting is typically found under “Administration” or “Remote Management” in the router’s settings.
- Use Strong Network Segmentation: Place critical devices on a separate network VLAN, if possible, to limit the blast radius of a potential compromise.
- Monitor Network Traffic: Be alert for unusual outbound connections or traffic spikes originating from the router itself.
General Advice: As a best practice, always keep router firmware updated and avoid exposing administrative interfaces to the public internet.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-base...
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url re...
A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to sta...
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of ...
Other Dlink Dwr-m960 Firmware Vulnerabilities
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-base...
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url re...
A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to sta...
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of ...