Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
D-Link DWR-M960 IPv6 Setup Function Allows Remote Code Execution
CVE-2026-2885
Summary
A security flaw in the D-Link DWR-M960's IPv6 setup function can allow an attacker to execute malicious code on the device remotely. This means an attacker could potentially take control of the device. To protect your device, update to a fixed version of the software as soon as possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dwr-m960_firmware | 1.01.07 | – |
Original title
A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url result...
Original description
A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/LX-66-LX/cve-new/issues/19 Exploit Issue Tracking Third Party Advisory
- https://vuldb.com/?ctiid.347179 Permissions Required VDB Entry
- https://vuldb.com/?id.347179 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754496 Third Party Advisory VDB Entry
- https://www.dlink.com/ Product
Published: 21 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026