CVE-2026-2959

8.8 HIGH
Published: February 23, 2026 Modified: February 23, 2026
View on NVD

Description

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

AI Explanation

### 1. Plain-Language Summary This vulnerability is a stack-based buffer overflow in the D-Link DWR-M960 router firmware. An attacker can remotely crash the device or potentially take control of it by sending a specially crafted malicious URL to the router’s web interface. ### 2. Who Is Affected - **Product**: D-Link DWR-M960 router - **Version**: Firmware version 1.01.07 - **Scope**: Any device running this specific firmware is vulnerable. Older/newer versions are not mentioned and should be checked against vendor advisories. ### 3. Attacker Impact An attacker exploiting this could: - **Execute arbitrary code**: Gain full control of the router (e.g., intercept traffic, launch attacks from the device). - **Cause denial of service**: Crash the device, disrupting network connectivity. - **Exploit remotely**: Attack requires no physical access—only network connectivity to the router’s web interface. ### 4. Recommended Remediation - **Patch Immediately**: Update the router to a firmware version **higher than 1.01.07** (check D-Link’s security advisories for patches). - **Mitigate if Unpatched**: - Disable remote management access to the router. - Restrict web interface access to trusted internal IPs only. - Block unsolicited inbound traffic to the router’s IP. - **Replace if Unsupported**: If no patch is available, decommission the device and replace it with a supported router. - **Monitor**: Verify updates via D-Link’s official channels (e.g., [D-Link Support](https://support.dlink.com)). > **Urgency Note**: The exploit is public (CVSS 8.8 HIGH). Prioritize patching or mitigating immediately to prevent compromise.

Generated: 2026-02-23 04:05

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/LX-66-LX/cve-new/issues/26
Source: cna@vuldb.com
Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.347326
Source: cna@vuldb.com
Permissions Required VDB Entry
https://vuldb.com/?id.347326
Source: cna@vuldb.com
Third Party Advisory VDB Entry
https://vuldb.com/?submit.754511
Source: cna@vuldb.com
Third Party Advisory VDB Entry
https://www.dlink.com/
Source: cna@vuldb.com
Product

5 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.8 / 10.0
EPSS (Exploit Probability)
0.0%
13th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

dlink