Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2928: Stack-based Buffer Overflow in D-Link DWR-M960

0
High
VulnerabilityCVE-2026-2928cvecve-2026-2928
Published: Sun Feb 22 2026 (02/22/2026, 05:02:13 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M960

Description

CVE-2026-2928 is a high-severity stack-based buffer overflow vulnerability in the D-Link DWR-M960 router firmware version 1. 01. 07. The flaw exists in the WLAN Encryption Configuration Endpoint, specifically in the sub_452CCC function of the /boafrm/formWlEncrypt component. An attacker can remotely exploit this vulnerability by manipulating the 'submit-url' argument, causing a buffer overflow on the stack. This can lead to arbitrary code execution with low privileges and no user interaction required. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of active exploitation. The vulnerability does not require authentication, making it accessible to remote attackers over the network. Organizations using the affected D-Link router model should prioritize patching or mitigating this issue to prevent potential compromise. The vulnerability has a CVSS 4.

AI-Powered Analysis

AILast updated: 02/22/2026, 05:31:29 UTC

Technical Analysis

CVE-2026-2928 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The vulnerability resides in the WLAN Encryption Configuration Endpoint, specifically within the sub_452CCC function of the /boafrm/formWlEncrypt component. The issue arises when an attacker manipulates the 'submit-url' argument, causing the function to write more data to the stack buffer than it can hold, resulting in a buffer overflow. This overflow can overwrite the return address or other control data on the stack, potentially allowing remote code execution. The vulnerability can be exploited remotely without authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no exploits are currently observed in the wild, public exploit code availability increases the risk of exploitation. The affected device is a widely used 4G LTE router model, often deployed in small to medium enterprises and home networks, which could lead to significant exposure. The lack of available patches at the time of disclosure necessitates immediate mitigation strategies. This vulnerability could allow attackers to gain control over the device, intercept or manipulate network traffic, and pivot into internal networks.

Potential Impact

The impact of CVE-2026-2928 is significant for organizations using the D-Link DWR-M960 router, as successful exploitation can lead to full compromise of the device. Attackers can execute arbitrary code remotely, potentially gaining control over the router's firmware and configuration. This can result in interception, modification, or redirection of network traffic, undermining confidentiality and integrity of communications. Additionally, attackers may use the compromised router as a foothold to launch further attacks within the internal network, escalating privileges and accessing sensitive systems. The availability of the network device may also be disrupted, causing denial of service. Since the vulnerability requires no user interaction and low privileges, it is highly exploitable. Organizations relying on this router for critical connectivity, including small businesses and remote offices, face increased risk of data breaches, espionage, and operational disruption. The public disclosure of exploit code further elevates the threat level, potentially leading to widespread attacks if mitigations are not applied promptly.

Mitigation Recommendations

1. Immediate mitigation should focus on isolating the affected D-Link DWR-M960 devices from untrusted networks to reduce exposure to remote attacks. 2. Network administrators should implement strict firewall rules to restrict access to the router's management interfaces, especially blocking access to the vulnerable WLAN Encryption Configuration Endpoint from external networks. 3. Monitor network traffic for unusual activity or signs of exploitation attempts targeting the 'submit-url' parameter. 4. If possible, disable remote management features or restrict them to trusted IP addresses only. 5. Regularly check for firmware updates or security advisories from D-Link and apply patches as soon as they become available. 6. Consider replacing affected devices with models that have no known vulnerabilities or have received security updates. 7. Employ network segmentation to limit the impact of a compromised router on internal systems. 8. Conduct security awareness training for staff to recognize signs of network compromise. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential breaches. 10. Use intrusion detection/prevention systems (IDS/IPS) configured to detect exploitation attempts targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-21T04:58:36.992Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699a9159be58cf853be4af18

Added to database: 2/22/2026, 5:17:13 AM

Last enriched: 2/22/2026, 5:31:29 AM

Last updated: 2/22/2026, 7:38:11 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats