CVE-2026-2857: Stack-based Buffer Overflow in D-Link DWR-M960
A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_423E00 of the file /boafrm/formPortFw of the component Port Forwarding Configuration Endpoint. This manipulation of the argument submit-url causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2026-2857 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The vulnerability resides in the Port Forwarding Configuration Endpoint, specifically in the function sub_423E00 located in the /boafrm/formPortFw file. The issue arises when the submit-url argument is manipulated by an attacker, causing a stack-based buffer overflow. This overflow can be exploited remotely without requiring authentication or user interaction, allowing attackers to execute arbitrary code on the affected device. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact covers confidentiality, integrity, and availability, with high potential for system compromise. Although no exploits are currently observed in the wild, the public disclosure of exploit code increases the likelihood of future attacks. The vulnerability affects a widely used consumer and enterprise-grade router, which could be leveraged to gain unauthorized access to internal networks or disrupt network services. No official patches have been linked yet, emphasizing the need for proactive mitigation.
Potential Impact
The vulnerability allows remote attackers to execute arbitrary code on affected D-Link DWR-M960 devices, potentially leading to full compromise of the router. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network availability, and deployment of persistent malware or botnets. Organizations relying on these routers for internet connectivity or network segmentation face risks including data breaches, service outages, and lateral movement by attackers. The lack of required authentication and user interaction significantly increases the attack surface and ease of exploitation. Given the critical role of routers in network infrastructure, exploitation could have cascading effects on organizational cybersecurity posture and operational continuity.
Mitigation Recommendations
Organizations should immediately verify if they are using the D-Link DWR-M960 router with firmware version 1.01.07 and prioritize mitigation. Since no official patches are currently linked, recommended mitigations include: (1) Restricting remote access to the router’s management interface by disabling WAN-side administration or limiting access via firewall rules; (2) Monitoring network traffic for unusual activity targeting the port forwarding configuration endpoint; (3) Applying network segmentation to isolate vulnerable devices from critical infrastructure; (4) Employing intrusion detection/prevention systems (IDS/IPS) with signatures for buffer overflow attempts targeting D-Link routers; (5) Regularly checking for firmware updates from D-Link and applying them promptly once available; (6) Considering temporary replacement or upgrade of affected devices if patching is delayed; (7) Educating network administrators about the vulnerability and signs of exploitation to enable rapid incident response.
Affected Countries
United States, Canada, Germany, United Kingdom, France, Australia, Japan, South Korea, India, Brazil, Mexico, Russia, China, Italy, Spain
CVE-2026-2857: Stack-based Buffer Overflow in D-Link DWR-M960
Description
A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_423E00 of the file /boafrm/formPortFw of the component Port Forwarding Configuration Endpoint. This manipulation of the argument submit-url causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2026-2857 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The vulnerability resides in the Port Forwarding Configuration Endpoint, specifically in the function sub_423E00 located in the /boafrm/formPortFw file. The issue arises when the submit-url argument is manipulated by an attacker, causing a stack-based buffer overflow. This overflow can be exploited remotely without requiring authentication or user interaction, allowing attackers to execute arbitrary code on the affected device. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact covers confidentiality, integrity, and availability, with high potential for system compromise. Although no exploits are currently observed in the wild, the public disclosure of exploit code increases the likelihood of future attacks. The vulnerability affects a widely used consumer and enterprise-grade router, which could be leveraged to gain unauthorized access to internal networks or disrupt network services. No official patches have been linked yet, emphasizing the need for proactive mitigation.
Potential Impact
The vulnerability allows remote attackers to execute arbitrary code on affected D-Link DWR-M960 devices, potentially leading to full compromise of the router. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network availability, and deployment of persistent malware or botnets. Organizations relying on these routers for internet connectivity or network segmentation face risks including data breaches, service outages, and lateral movement by attackers. The lack of required authentication and user interaction significantly increases the attack surface and ease of exploitation. Given the critical role of routers in network infrastructure, exploitation could have cascading effects on organizational cybersecurity posture and operational continuity.
Mitigation Recommendations
Organizations should immediately verify if they are using the D-Link DWR-M960 router with firmware version 1.01.07 and prioritize mitigation. Since no official patches are currently linked, recommended mitigations include: (1) Restricting remote access to the router’s management interface by disabling WAN-side administration or limiting access via firewall rules; (2) Monitoring network traffic for unusual activity targeting the port forwarding configuration endpoint; (3) Applying network segmentation to isolate vulnerable devices from critical infrastructure; (4) Employing intrusion detection/prevention systems (IDS/IPS) with signatures for buffer overflow attempts targeting D-Link routers; (5) Regularly checking for firmware updates from D-Link and applying them promptly once available; (6) Considering temporary replacement or upgrade of affected devices if patching is delayed; (7) Educating network administrators about the vulnerability and signs of exploitation to enable rapid incident response.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-20T10:37:52.929Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6998cf5abe58cf853bb24faa
Added to database: 2/20/2026, 9:17:14 PM
Last enriched: 2/20/2026, 9:31:29 PM
Last updated: 2/21/2026, 1:38:18 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.