Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
D-Link DWR-M960: Remote Code Execution through VPN Configuration
CVE-2026-2961
Summary
A bug in the D-Link DWR-M960's VPN setup feature allows an attacker to inject malicious code, potentially granting them control over the device. This could lead to unauthorized access or changes to your network settings. It's recommended that you update your device to the latest version to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dwr-m960_firmware | 1.01.07 | – |
Original title
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation ...
Original description
A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/LX-66-LX/cve-new/issues/28 Exploit Issue Tracking Third Party Advisory
- https://vuldb.com/?ctiid.347328 Permissions Required VDB Entry
- https://vuldb.com/?id.347328 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754513 Third Party Advisory VDB Entry
- https://www.dlink.com/ Product
Published: 23 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026