Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
D-Link DWR-M960: Remote code execution through firewall config
CVE-2026-2881
Summary
A security flaw in the D-Link DWR-M960's advanced firewall settings can be exploited by an attacker to run malicious code on the device. This can happen if a hacker sends a specially crafted message to the device. To protect your network, update your D-Link DWR-M960 to the latest firmware version.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dwr-m960_firmware | 1.01.07 | – |
Original title
A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_425FF8 of the file /boafrm/formFirewallAdv of the component Advanced Firewall Configuration En...
Original description
A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_425FF8 of the file /boafrm/formFirewallAdv of the component Advanced Firewall Configuration Endpoint. Such manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/LX-66-LX/cve-new/issues/15 Exploit Issue Tracking Third Party Advisory
- https://vuldb.com/?ctiid.347175 Permissions Required VDB Entry
- https://vuldb.com/?id.347175 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754486 Third Party Advisory VDB Entry
- https://www.dlink.com/ Product
Published: 21 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026