CVE-2026-2884: Stack-based Buffer Overflow in D-Link DWR-M960
A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element is the function sub_41914C of the file /boafrm/formWanConfigSetup of the component WAN Interface Setting Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2026-2884 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The flaw resides in the WAN Interface Setting Handler, specifically in the function sub_41914C located in the /boafrm/formWanConfigSetup file. The vulnerability is triggered by manipulating the 'submit-url' parameter, which leads to a stack overflow condition. This overflow can corrupt the stack memory, potentially allowing an attacker to execute arbitrary code remotely. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring no user interaction (UI:N) but low privileges (PR:L). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H). The scope is unchanged (S: N), and no security authentication or user interaction is needed, making exploitation feasible remotely. Although no active exploitation in the wild has been reported, a public exploit exists, increasing the risk of future attacks. The vulnerability is critical for organizations relying on this router model, especially in environments where WAN interface configuration is exposed or accessible remotely. The lack of an official patch link suggests that mitigation may require vendor firmware updates or alternative protective measures.
Potential Impact
The impact of CVE-2026-2884 is significant for organizations using the D-Link DWR-M960 router firmware version 1.01.07. Successful exploitation can lead to remote code execution, allowing attackers to gain control over the affected device. This compromises the confidentiality of network traffic and device configuration, the integrity of network operations, and the availability of network services. Attackers could use the compromised router as a foothold to pivot into internal networks, launch further attacks, or disrupt communications. Given the router’s role in WAN interface management, exploitation could affect enterprise branch offices, small to medium businesses, and home networks relying on this device. The availability of a public exploit increases the likelihood of targeted attacks or automated scanning campaigns. Organizations without timely patching or mitigations risk operational disruptions, data breaches, and potential lateral movement by attackers.
Mitigation Recommendations
1. Immediately check for and apply any official firmware updates from D-Link addressing this vulnerability. 2. If no patch is available, restrict remote access to the router’s WAN interface management functions via firewall rules or network segmentation. 3. Disable remote management features on the affected device unless absolutely necessary. 4. Employ intrusion detection and prevention systems (IDS/IPS) with signatures to detect attempts to exploit this specific buffer overflow. 5. Monitor network traffic for anomalous requests targeting the /boafrm/formWanConfigSetup endpoint or unusual 'submit-url' parameter usage. 6. Conduct regular vulnerability scans and penetration tests focusing on network devices to identify exposure. 7. Consider replacing affected devices with newer models if vendor support is discontinued or patches are delayed. 8. Educate network administrators on the risks of exposing WAN interface configuration to untrusted networks.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Brazil
CVE-2026-2884: Stack-based Buffer Overflow in D-Link DWR-M960
Description
A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element is the function sub_41914C of the file /boafrm/formWanConfigSetup of the component WAN Interface Setting Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2026-2884 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The flaw resides in the WAN Interface Setting Handler, specifically in the function sub_41914C located in the /boafrm/formWanConfigSetup file. The vulnerability is triggered by manipulating the 'submit-url' parameter, which leads to a stack overflow condition. This overflow can corrupt the stack memory, potentially allowing an attacker to execute arbitrary code remotely. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring no user interaction (UI:N) but low privileges (PR:L). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H). The scope is unchanged (S: N), and no security authentication or user interaction is needed, making exploitation feasible remotely. Although no active exploitation in the wild has been reported, a public exploit exists, increasing the risk of future attacks. The vulnerability is critical for organizations relying on this router model, especially in environments where WAN interface configuration is exposed or accessible remotely. The lack of an official patch link suggests that mitigation may require vendor firmware updates or alternative protective measures.
Potential Impact
The impact of CVE-2026-2884 is significant for organizations using the D-Link DWR-M960 router firmware version 1.01.07. Successful exploitation can lead to remote code execution, allowing attackers to gain control over the affected device. This compromises the confidentiality of network traffic and device configuration, the integrity of network operations, and the availability of network services. Attackers could use the compromised router as a foothold to pivot into internal networks, launch further attacks, or disrupt communications. Given the router’s role in WAN interface management, exploitation could affect enterprise branch offices, small to medium businesses, and home networks relying on this device. The availability of a public exploit increases the likelihood of targeted attacks or automated scanning campaigns. Organizations without timely patching or mitigations risk operational disruptions, data breaches, and potential lateral movement by attackers.
Mitigation Recommendations
1. Immediately check for and apply any official firmware updates from D-Link addressing this vulnerability. 2. If no patch is available, restrict remote access to the router’s WAN interface management functions via firewall rules or network segmentation. 3. Disable remote management features on the affected device unless absolutely necessary. 4. Employ intrusion detection and prevention systems (IDS/IPS) with signatures to detect attempts to exploit this specific buffer overflow. 5. Monitor network traffic for anomalous requests targeting the /boafrm/formWanConfigSetup endpoint or unusual 'submit-url' parameter usage. 6. Conduct regular vulnerability scans and penetration tests focusing on network devices to identify exposure. 7. Consider replacing affected devices with newer models if vendor support is discontinued or patches are delayed. 8. Educate network administrators on the risks of exposing WAN interface configuration to untrusted networks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-20T16:59:18.740Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699a1a4cbe58cf853b44c9d4
Added to database: 2/21/2026, 8:49:16 PM
Last enriched: 2/21/2026, 8:49:27 PM
Last updated: 2/22/2026, 7:03:44 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2930: Stack-based Buffer Overflow in Tenda A18
MediumCVE-2026-2929: Stack-based Buffer Overflow in D-Link DWR-M960
HighCVE-2026-2928: Stack-based Buffer Overflow in D-Link DWR-M960
HighCVE-2026-2927: Stack-based Buffer Overflow in D-Link DWR-M960
HighCVE-2026-2926: Stack-based Buffer Overflow in D-Link DWR-M960
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.