CVE-2026-2856: Stack-based Buffer Overflow in D-Link DWR-M960
A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2026-2856 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The flaw resides in the Filter Configuration Endpoint component, specifically within the function sub_424AFC located in the /boafrm/formFilter file. The vulnerability is triggered by manipulating the 'submit-url' argument, which leads to an overflow of the stack buffer. This overflow can corrupt adjacent memory, potentially allowing an attacker to execute arbitrary code remotely. The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The CVSS 4.0 score of 8.7 reflects its high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no confirmed exploitation in the wild has been reported, public availability of exploit code increases the risk of imminent attacks. The vulnerability affects only firmware version 1.01.07 of the DWR-M960 model, emphasizing the need for firmware updates or alternative mitigations. The lack of official patches at the time of disclosure necessitates immediate defensive measures to reduce exposure.
Potential Impact
The exploitation of CVE-2026-2856 can have severe consequences for organizations globally. Successful attacks can lead to remote code execution with elevated privileges on affected D-Link DWR-M960 routers, compromising device integrity and control. This can result in unauthorized network access, interception or manipulation of network traffic, and potential pivoting to internal networks. Confidential data passing through the device may be exposed or altered, and availability may be disrupted by device crashes or malicious payloads. Given the router's role in network infrastructure, compromised devices can serve as entry points for broader attacks, including lateral movement and persistent threats. The absence of authentication and user interaction requirements significantly increases the attack surface. Organizations relying on this router model for critical connectivity or in sensitive environments face heightened risks of operational disruption and data breaches.
Mitigation Recommendations
To mitigate CVE-2026-2856, organizations should immediately verify if they are running D-Link DWR-M960 firmware version 1.01.07 and prioritize upgrading to a patched firmware version once released by D-Link. In the absence of an official patch, network administrators should restrict access to the router's management interfaces by implementing network segmentation and firewall rules to limit exposure to trusted IP addresses only. Disabling remote management features and filtering inbound traffic targeting the /boafrm/formFilter endpoint can reduce attack vectors. Monitoring network traffic for anomalous requests containing suspicious 'submit-url' parameters is advised. Employing intrusion detection/prevention systems (IDS/IPS) with signatures tailored to detect exploitation attempts can provide additional protection. Regularly auditing device configurations and maintaining up-to-date inventories of network equipment will facilitate rapid response. Finally, organizations should engage with D-Link support channels to obtain updates and advisories promptly.
Affected Countries
United States, Germany, United Kingdom, India, Brazil, Australia, Canada, France, Japan, South Korea
CVE-2026-2856: Stack-based Buffer Overflow in D-Link DWR-M960
Description
A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2856 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The flaw resides in the Filter Configuration Endpoint component, specifically within the function sub_424AFC located in the /boafrm/formFilter file. The vulnerability is triggered by manipulating the 'submit-url' argument, which leads to an overflow of the stack buffer. This overflow can corrupt adjacent memory, potentially allowing an attacker to execute arbitrary code remotely. The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The CVSS 4.0 score of 8.7 reflects its high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no confirmed exploitation in the wild has been reported, public availability of exploit code increases the risk of imminent attacks. The vulnerability affects only firmware version 1.01.07 of the DWR-M960 model, emphasizing the need for firmware updates or alternative mitigations. The lack of official patches at the time of disclosure necessitates immediate defensive measures to reduce exposure.
Potential Impact
The exploitation of CVE-2026-2856 can have severe consequences for organizations globally. Successful attacks can lead to remote code execution with elevated privileges on affected D-Link DWR-M960 routers, compromising device integrity and control. This can result in unauthorized network access, interception or manipulation of network traffic, and potential pivoting to internal networks. Confidential data passing through the device may be exposed or altered, and availability may be disrupted by device crashes or malicious payloads. Given the router's role in network infrastructure, compromised devices can serve as entry points for broader attacks, including lateral movement and persistent threats. The absence of authentication and user interaction requirements significantly increases the attack surface. Organizations relying on this router model for critical connectivity or in sensitive environments face heightened risks of operational disruption and data breaches.
Mitigation Recommendations
To mitigate CVE-2026-2856, organizations should immediately verify if they are running D-Link DWR-M960 firmware version 1.01.07 and prioritize upgrading to a patched firmware version once released by D-Link. In the absence of an official patch, network administrators should restrict access to the router's management interfaces by implementing network segmentation and firewall rules to limit exposure to trusted IP addresses only. Disabling remote management features and filtering inbound traffic targeting the /boafrm/formFilter endpoint can reduce attack vectors. Monitoring network traffic for anomalous requests containing suspicious 'submit-url' parameters is advised. Employing intrusion detection/prevention systems (IDS/IPS) with signatures tailored to detect exploitation attempts can provide additional protection. Regularly auditing device configurations and maintaining up-to-date inventories of network equipment will facilitate rapid response. Finally, organizations should engage with D-Link support channels to obtain updates and advisories promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-20T10:37:50.188Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6998c9e1be58cf853bab6aa3
Added to database: 2/20/2026, 8:53:53 PM
Last enriched: 2/28/2026, 12:49:25 PM
Last updated: 4/7/2026, 1:32:07 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.