Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
D-Link DWR-M960 DDNS Settings Handler Allows Remote Code Execution
CVE-2026-2855
Summary
A security flaw in the D-Link DWR-M960's DDNS Settings Handler can allow an attacker to execute unauthorized code on the device, potentially allowing them to take control of the device. This can happen if a hacker sends a specially crafted request to the device. To protect your device, update to the latest firmware version as soon as possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dwr-m960_firmware | 1.01.07 | – |
Original title
A vulnerability has been found in D-Link DWR-M960 1.01.07. Affected is the function sub_4648F0 of the file /boafrm/formDdns of the component DDNS Settings Handler. The manipulation of the argument ...
Original description
A vulnerability has been found in D-Link DWR-M960 1.01.07. Affected is the function sub_4648F0 of the file /boafrm/formDdns of the component DDNS Settings Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/LX-66-LX/cve-new/issues/12 Exploit Issue Tracking Third Party Advisory
- https://vuldb.com/?ctiid.347094 Permissions Required VDB Entry
- https://vuldb.com/?id.347094 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754458 Third Party Advisory VDB Entry
- https://www.dlink.com/ Product
Published: 20 Feb 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026