Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
D-Link DWR-M960: Remote Code Execution via Log Configuration
CVE-2026-2853
Summary
A flaw in the D-Link DWR-M960's log configuration system can be exploited by an attacker to inject malicious code. This could allow an attacker to take control of the device. We recommend that users update their device to the latest firmware version.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dwr-m960_firmware | 1.01.07 | – |
Original title
A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the function sub_462E14 of the file /boafrm/formSysLog of the component System Log Configuration Endpoint. Performing a manipul...
Original description
A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the function sub_462E14 of the file /boafrm/formSysLog of the component System Log Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/LX-66-LX/cve-new/issues/10 Exploit Issue Tracking Third Party Advisory
- https://vuldb.com/?ctiid.347092 Permissions Required VDB Entry
- https://vuldb.com/?id.347092 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754456 Third Party Advisory VDB Entry
- https://www.dlink.com/ Product
Published: 20 Feb 2026 · Updated: 14 Mar 2026 · First seen: 6 Mar 2026