Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
D-Link DWR-M960 Allows Remote Attack via Malformed URL
CVE-2026-2959
Summary
A flaw in the D-Link DWR-M960's scheduling function can be exploited remotely. An attacker can manipulate the URL to cause the device to crash or run malicious code. Update the device's firmware to patch this vulnerability.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dwr-m960_firmware | 1.01.07 | – |
Original title
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url...
Original description
A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/LX-66-LX/cve-new/issues/26 Exploit Issue Tracking Third Party Advisory
- https://vuldb.com/?ctiid.347326 Permissions Required VDB Entry
- https://vuldb.com/?id.347326 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754511 Third Party Advisory VDB Entry
- https://www.dlink.com/ Product
Published: 23 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026