Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
D-Link DWR-M960: Remote Code Execution Risk Through NTP Configuration
CVE-2026-2854
Summary
A vulnerability in the D-Link DWR-M960 router's NTP configuration feature allows an attacker to potentially execute malicious code remotely. This could happen if the attacker can trick the router into processing a specially crafted URL. It's recommended to update the router's firmware to the latest version to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dlink | dwr-m960_firmware | 1.01.07 | – |
Original title
A flaw has been found in D-Link DWR-M960 1.01.07. This impacts the function sub_4611CC of the file /boafrm/formNtp of the component NTP Configuration Endpoint. Executing a manipulation of the argum...
Original description
A flaw has been found in D-Link DWR-M960 1.01.07. This impacts the function sub_4611CC of the file /boafrm/formNtp of the component NTP Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/LX-66-LX/cve-new/issues/11 Exploit Issue Tracking Third Party Advisory
- https://vuldb.com/?ctiid.347093 Permissions Required VDB Entry
- https://vuldb.com/?id.347093 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754457 Third Party Advisory VDB Entry
- https://www.dlink.com/ Product
Published: 20 Feb 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026