Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2883: Stack-based Buffer Overflow in D-Link DWR-M960

0
High
VulnerabilityCVE-2026-2883cvecve-2026-2883
Published: Sat Feb 21 2026 (02/21/2026, 20:02:13 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M960

Description

A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_427D74 of the file /boafrm/formIpQoS. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 06:14:12 UTC

Technical Analysis

CVE-2026-2883 identifies a critical stack-based buffer overflow vulnerability in the D-Link DWR-M960 router firmware version 1.01.07. The vulnerability resides in the function sub_427D74 within the /boafrm/formIpQoS component, which processes the submit-url argument. An attacker can remotely send a specially crafted request manipulating this argument to overflow the stack buffer, potentially overwriting the return address or other control data. This can lead to arbitrary code execution with elevated privileges on the device. The vulnerability requires no user interaction and no prior authentication, making it highly exploitable over the network. The CVSS 4.0 base score is 8.7, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. While no exploits are currently observed in the wild, the public disclosure of exploit details increases the likelihood of active exploitation attempts. The affected device is a widely used 4G LTE router, often deployed in enterprise and critical infrastructure environments, amplifying the potential impact. The lack of an official patch at the time of disclosure necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

Successful exploitation of CVE-2026-2883 can lead to full compromise of the affected D-Link DWR-M960 router, allowing attackers to execute arbitrary code with system-level privileges. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network availability, and potential pivoting to other connected systems. The confidentiality of sensitive data passing through the device can be compromised, and the integrity of network configurations can be altered maliciously. For organizations relying on these routers for critical connectivity, this vulnerability poses a significant risk to operational continuity and data security. The remote, unauthenticated nature of the exploit increases the attack surface, enabling attackers to target exposed devices directly from the internet or untrusted networks. The absence of known active exploits currently provides a window for remediation, but the public disclosure heightens the urgency to act before widespread exploitation occurs.

Mitigation Recommendations

1. Immediately isolate affected D-Link DWR-M960 devices from untrusted networks to prevent remote exploitation. 2. Monitor network traffic for unusual requests targeting the /boafrm/formIpQoS endpoint, especially those manipulating the submit-url parameter. 3. Disable or restrict access to the vulnerable web management interface from external networks using firewall rules or access control lists. 4. Implement network segmentation to limit the exposure of vulnerable devices to critical internal systems. 5. Regularly check for and apply official firmware updates or patches from D-Link once available. 6. If patching is not immediately possible, consider deploying Web Application Firewall (WAF) rules or Intrusion Prevention Systems (IPS) signatures to detect and block exploit attempts targeting this vulnerability. 7. Conduct thorough security assessments of all network devices to identify and remediate similar vulnerabilities. 8. Educate network administrators on the risks and signs of exploitation to enable rapid incident response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T16:59:15.863Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699a12cabe58cf853b2525ca

Added to database: 2/21/2026, 8:17:14 PM

Last enriched: 3/1/2026, 6:14:12 AM

Last updated: 4/8/2026, 6:08:17 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses