Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2927: Stack-based Buffer Overflow in D-Link DWR-M960

0
High
VulnerabilityCVE-2026-2927cvecve-2026-2927
Published: Sun Feb 22 2026 (02/22/2026, 04:32:15 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M960

Description

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the component Operation Mode Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 00:28:45 UTC

Technical Analysis

CVE-2026-2927 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The vulnerability resides in the function sub_462590 within the /boafrm/formOpMode component, which handles the Operation Mode Configuration Endpoint. Specifically, the vulnerability is triggered by manipulating the submit-url argument, which leads to a stack-based buffer overflow condition. This overflow can corrupt the stack, potentially allowing an attacker to overwrite the return address or other control data, resulting in arbitrary code execution or a denial of service (crash). The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no known exploits have been observed in the wild yet, the public disclosure of the exploit code increases the likelihood of active exploitation attempts. The affected product is a widely deployed 4G LTE router used in various enterprise and consumer environments, often at network perimeters, making it a valuable target for attackers seeking network access or disruption.

Potential Impact

The impact of CVE-2026-2927 is significant for organizations using the D-Link DWR-M960 router, especially in environments where these devices serve as critical network gateways or provide internet connectivity. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary code with system-level privileges. This can result in unauthorized network access, interception or manipulation of network traffic, installation of persistent malware, or disruption of network availability through denial of service. The vulnerability affects confidentiality, integrity, and availability simultaneously, posing risks to sensitive data and operational continuity. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable devices en masse, potentially leading to widespread network breaches or service outages. Organizations relying on these routers for secure communications or remote connectivity are particularly vulnerable to espionage, data theft, or sabotage.

Mitigation Recommendations

To mitigate CVE-2026-2927, organizations should immediately verify if they are using the D-Link DWR-M960 router with firmware version 1.01.07 and prioritize upgrading to a patched firmware version once released by D-Link. In the absence of an official patch, network administrators should implement compensating controls such as restricting access to the router’s management interface via firewall rules to trusted IP addresses only, disabling remote management features if not required, and monitoring network traffic for anomalous requests targeting the /boafrm/formOpMode endpoint. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability can help detect and block exploitation attempts. Regularly auditing router configurations and logs for suspicious activity is also recommended. Additionally, organizations should segment networks to isolate vulnerable devices from critical assets and apply network-level protections such as VPNs and strong authentication for remote access. Finally, maintain awareness of vendor advisories and threat intelligence updates to respond promptly to emerging exploit activity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-21T04:58:33.810Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699a8a51be58cf853bdd6463

Added to database: 2/22/2026, 4:47:13 AM

Last enriched: 3/2/2026, 12:28:45 AM

Last updated: 4/8/2026, 10:48:57 AM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses