Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
D-Link DWR-M960: Remote Code Execution through Buffer Overflow
CVE-2026-2958
Summary
A flaw in the D-Link DWR-M960's software allows an attacker to potentially execute unauthorized code on the device remotely. This means an attacker could take control of the device, which could lead to data breaches or other security issues. To protect your device, update to the latest software version as soon as possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dwr-m960_firmware | 1.01.07 | – |
Original title
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-b...
Original description
A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/LX-66-LX/cve-new/issues/25 Exploit Issue Tracking Third Party Advisory
- https://vuldb.com/?ctiid.347325 Permissions Required VDB Entry
- https://vuldb.com/?id.347325 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754509 Third Party Advisory VDB Entry
- https://www.dlink.com/ Product
Published: 23 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026