CVE-2026-2925: Stack-based Buffer Overflow in D-Link DWR-M960
CVE-2026-2925 is a high-severity stack-based buffer overflow vulnerability affecting the D-Link DWR-M960 router firmware version 1. 01. 07. The flaw exists in the Bridge VLAN Configuration Endpoint, specifically in the function sub_42B5A0 within /boafrm/formBridgeVlan, where manipulation of the submit-url argument can trigger the overflow. This vulnerability can be exploited remotely without user interaction or prior authentication, allowing attackers to potentially execute arbitrary code with elevated privileges. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of active exploitation. The vulnerability has a CVSS 4. 0 score of 8. 7, reflecting its high impact on confidentiality, integrity, and availability. Organizations using the affected D-Link DWR-M960 devices should prioritize patching or applying mitigations to prevent exploitation.
AI Analysis
Technical Summary
CVE-2026-2925 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The vulnerability resides in the Bridge VLAN Configuration Endpoint, specifically in the function sub_42B5A0 located in the /boafrm/formBridgeVlan file. An attacker can exploit this flaw by manipulating the submit-url argument, which leads to a stack-based buffer overflow condition. This type of overflow can overwrite the stack memory, potentially allowing arbitrary code execution or causing a denial of service. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 base score is 8.7, indicating a high severity level due to the ease of exploitation (network attack vector, low attack complexity), no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of exploitation attempts. The affected device, D-Link DWR-M960, is a 5G NR router used in various enterprise and consumer environments, often deployed in regions with growing 5G infrastructure. The lack of an official patch or update link in the provided data suggests that mitigation may currently rely on network-level controls and vendor advisories. The vulnerability's exploitation could allow attackers to gain control over the device, intercept or manipulate network traffic, or disrupt network services.
Potential Impact
The impact of CVE-2026-2925 is significant for organizations using the D-Link DWR-M960 router, as successful exploitation can lead to full compromise of the device. This includes unauthorized remote code execution, which can be leveraged to install persistent malware, intercept sensitive communications, or pivot into internal networks. The confidentiality of data traversing the device can be compromised, integrity of network configurations can be altered, and availability of network services can be disrupted through denial-of-service conditions. Given the device's role as a network gateway, attackers gaining control could affect entire organizational networks, leading to data breaches, operational downtime, and reputational damage. The remote, unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments where these routers are exposed to untrusted networks or the internet. The absence of known active exploits currently reduces immediate risk but the public exploit code availability necessitates urgent mitigation. Organizations in sectors relying on 5G connectivity and remote network access are particularly vulnerable, as these routers often serve as critical infrastructure components.
Mitigation Recommendations
To mitigate CVE-2026-2925, organizations should first verify if they are running the affected D-Link DWR-M960 firmware version 1.01.07 and seek firmware updates or patches from D-Link as they become available. In the absence of an official patch, network administrators should restrict access to the router's management interface by implementing strict firewall rules limiting access to trusted IP addresses only. Disabling remote management features or changing default management ports can reduce exposure. Network segmentation should be employed to isolate the router from critical internal systems, minimizing lateral movement opportunities. Continuous monitoring for unusual traffic patterns targeting the /boafrm/formBridgeVlan endpoint or attempts to manipulate the submit-url parameter is recommended. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts can provide early warning. Additionally, organizations should enforce strong network access controls and consider replacing vulnerable devices if no timely patch is available. Regular security audits and vulnerability scanning of network devices will help identify and remediate similar risks proactively.
Affected Countries
United States, China, India, Germany, United Kingdom, Brazil, Japan, South Korea, Australia, Canada
CVE-2026-2925: Stack-based Buffer Overflow in D-Link DWR-M960
Description
CVE-2026-2925 is a high-severity stack-based buffer overflow vulnerability affecting the D-Link DWR-M960 router firmware version 1. 01. 07. The flaw exists in the Bridge VLAN Configuration Endpoint, specifically in the function sub_42B5A0 within /boafrm/formBridgeVlan, where manipulation of the submit-url argument can trigger the overflow. This vulnerability can be exploited remotely without user interaction or prior authentication, allowing attackers to potentially execute arbitrary code with elevated privileges. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of active exploitation. The vulnerability has a CVSS 4. 0 score of 8. 7, reflecting its high impact on confidentiality, integrity, and availability. Organizations using the affected D-Link DWR-M960 devices should prioritize patching or applying mitigations to prevent exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2026-2925 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The vulnerability resides in the Bridge VLAN Configuration Endpoint, specifically in the function sub_42B5A0 located in the /boafrm/formBridgeVlan file. An attacker can exploit this flaw by manipulating the submit-url argument, which leads to a stack-based buffer overflow condition. This type of overflow can overwrite the stack memory, potentially allowing arbitrary code execution or causing a denial of service. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 base score is 8.7, indicating a high severity level due to the ease of exploitation (network attack vector, low attack complexity), no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of exploitation attempts. The affected device, D-Link DWR-M960, is a 5G NR router used in various enterprise and consumer environments, often deployed in regions with growing 5G infrastructure. The lack of an official patch or update link in the provided data suggests that mitigation may currently rely on network-level controls and vendor advisories. The vulnerability's exploitation could allow attackers to gain control over the device, intercept or manipulate network traffic, or disrupt network services.
Potential Impact
The impact of CVE-2026-2925 is significant for organizations using the D-Link DWR-M960 router, as successful exploitation can lead to full compromise of the device. This includes unauthorized remote code execution, which can be leveraged to install persistent malware, intercept sensitive communications, or pivot into internal networks. The confidentiality of data traversing the device can be compromised, integrity of network configurations can be altered, and availability of network services can be disrupted through denial-of-service conditions. Given the device's role as a network gateway, attackers gaining control could affect entire organizational networks, leading to data breaches, operational downtime, and reputational damage. The remote, unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments where these routers are exposed to untrusted networks or the internet. The absence of known active exploits currently reduces immediate risk but the public exploit code availability necessitates urgent mitigation. Organizations in sectors relying on 5G connectivity and remote network access are particularly vulnerable, as these routers often serve as critical infrastructure components.
Mitigation Recommendations
To mitigate CVE-2026-2925, organizations should first verify if they are running the affected D-Link DWR-M960 firmware version 1.01.07 and seek firmware updates or patches from D-Link as they become available. In the absence of an official patch, network administrators should restrict access to the router's management interface by implementing strict firewall rules limiting access to trusted IP addresses only. Disabling remote management features or changing default management ports can reduce exposure. Network segmentation should be employed to isolate the router from critical internal systems, minimizing lateral movement opportunities. Continuous monitoring for unusual traffic patterns targeting the /boafrm/formBridgeVlan endpoint or attempts to manipulate the submit-url parameter is recommended. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts can provide early warning. Additionally, organizations should enforce strong network access controls and consider replacing vulnerable devices if no timely patch is available. Regular security audits and vulnerability scanning of network devices will help identify and remediate similar risks proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-21T04:58:27.633Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699a8349be58cf853bd68ac9
Added to database: 2/22/2026, 4:17:13 AM
Last enriched: 2/22/2026, 4:31:28 AM
Last updated: 2/22/2026, 8:11:57 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2933: Cross Site Scripting in YiFang CMS
MediumCVE-2026-2932: Cross Site Scripting in YiFang CMS
MediumCVE-2026-2930: Stack-based Buffer Overflow in Tenda A18
MediumCVE-2026-2929: Stack-based Buffer Overflow in D-Link DWR-M960
HighCVE-2026-2928: Stack-based Buffer Overflow in D-Link DWR-M960
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.