Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2958: Stack-based Buffer Overflow in D-Link DWR-M960

0
High
VulnerabilityCVE-2026-2958cvecve-2026-2958
Published: Sun Feb 22 2026 (02/22/2026, 23:32:11 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M960

Description

CVE-2026-2958 is a high-severity stack-based buffer overflow vulnerability in the D-Link DWR-M960 router firmware version 1. 01. 07. The flaw exists in the function sub_457C5C within the /boafrm/formWsc file, where improper handling of the save_apply argument allows an attacker to overflow the stack. This vulnerability can be exploited remotely without authentication or user interaction, potentially leading to full compromise of the device. Although no public exploits are currently known in the wild, the exploit code has been disclosed publicly, increasing the risk of active exploitation. The vulnerability has a CVSS 4. 0 score of 8. 7, reflecting its ease of exploitation and high impact on confidentiality, integrity, and availability. Organizations using this router model should prioritize patching or mitigating this issue to prevent unauthorized control or disruption of network services.

AI-Powered Analysis

AILast updated: 02/23/2026, 00:01:45 UTC

Technical Analysis

CVE-2026-2958 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The vulnerability resides in the function sub_457C5C within the /boafrm/formWsc file, where the argument save_apply is improperly handled, allowing an attacker to overwrite the stack memory. This flaw can be triggered remotely without requiring authentication or user interaction, making it highly accessible to attackers. Exploiting this vulnerability could enable remote code execution, allowing attackers to take full control of the affected device, disrupt network operations, or pivot to internal networks. The vulnerability has been publicly disclosed, which increases the likelihood of exploitation despite no known active exploits in the wild at present. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H, I:H, A:H). The lack of available patches at the time of disclosure necessitates immediate mitigation efforts. This vulnerability is critical for organizations relying on the DWR-M960 for network connectivity, especially in environments where network security is paramount.

Potential Impact

The exploitation of CVE-2026-2958 can lead to complete compromise of the D-Link DWR-M960 router, allowing attackers to execute arbitrary code remotely. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of internet connectivity, and potential lateral movement within corporate or home networks. The high impact on confidentiality, integrity, and availability means sensitive data could be exposed or altered, and network services could be rendered unavailable. Organizations using this device in critical infrastructure, enterprise environments, or sensitive government networks face significant operational and security risks. The ease of exploitation without authentication increases the threat level, making automated mass exploitation campaigns feasible. Additionally, compromised routers can be leveraged as part of botnets or for launching further attacks, amplifying the overall threat landscape.

Mitigation Recommendations

1. Immediately check for firmware updates from D-Link addressing this vulnerability; apply patches as soon as they become available. 2. If patches are not yet released, restrict remote access to the router’s management interface by implementing network-level controls such as firewall rules or VPN-only access. 3. Disable any unnecessary remote management features to reduce the attack surface. 4. Monitor network traffic for unusual patterns that may indicate exploitation attempts, including unexpected outbound connections or anomalous behavior from the router. 5. Employ network segmentation to isolate vulnerable devices from critical systems and sensitive data. 6. Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 7. Educate network administrators about the vulnerability and ensure incident response plans include steps for compromised network devices. 8. Consider replacing affected devices with models that have a stronger security track record if timely patching is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-22T07:19:12.832Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699b9581be58cf853bc3dfa3

Added to database: 2/22/2026, 11:47:13 PM

Last enriched: 2/23/2026, 12:01:45 AM

Last updated: 2/23/2026, 8:06:52 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats