Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
D-Link DWR-M960: Unsecured User Input Leads to Remote Attack
CVE-2026-2856
Summary
A flaw in the D-Link DWR-M960's configuration settings can be exploited remotely, allowing attackers to potentially take control of the device. This can happen when the device incorrectly handles user input. Users should update their D-Link DWR-M960 to the latest version to mitigate this risk.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dwr-m960_firmware | 1.01.07 | – |
Original title
A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The ma...
Original description
A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/LX-66-LX/cve-new/issues/13 Exploit Issue Tracking Third Party Advisory
- https://vuldb.com/?ctiid.347095 Permissions Required VDB Entry
- https://vuldb.com/?id.347095 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754474 Third Party Advisory VDB Entry
- https://www.dlink.com/ Product
Published: 20 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026