Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
D-Link DWR-M960 Can Be Crashed Remotely by Malicious URL
CVE-2026-2962
Summary
A security issue in the D-Link DWR-M960 affects remote access and could allow an attacker to crash the device. This means an attacker can send a malicious request to the device, potentially disrupting its operation. D-Link has not yet released a patch for this issue, so users should be cautious when interacting with the device's web interface until a fix is available.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dwr-m960_firmware | 1.01.07 | – |
Original title
A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint....
Original description
A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/LX-66-LX/cve-new/issues/29 Exploit Issue Tracking Third Party Advisory
- https://vuldb.com/?ctiid.347329 Permissions Required VDB Entry
- https://vuldb.com/?id.347329 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754517 Third Party Advisory VDB Entry
- https://www.dlink.com/ Product
Published: 23 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026