Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2959: Stack-based Buffer Overflow in D-Link DWR-M960

0
High
VulnerabilityCVE-2026-2959cvecve-2026-2959
Published: Sun Feb 22 2026 (02/22/2026, 23:32:16 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M960

Description

CVE-2026-2959 is a high-severity stack-based buffer overflow vulnerability in the D-Link DWR-M960 router firmware version 1. 01. 07. The flaw exists in the function sub_44E0F8 within /boafrm/formNewSchedule, where manipulation of the 'url' argument can trigger the overflow. This vulnerability allows remote attackers to execute arbitrary code without authentication or user interaction. The exploit code is publicly available, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The vulnerability has a CVSS 4. 0 score of 8. 7, reflecting its critical impact on confidentiality, integrity, and availability. Organizations using this router model are at risk of remote compromise, potentially leading to full device takeover.

AI-Powered Analysis

AILast updated: 02/23/2026, 00:01:30 UTC

Technical Analysis

CVE-2026-2959 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The vulnerability resides in the function sub_44E0F8 within the /boafrm/formNewSchedule file, where improper handling of the 'url' parameter allows an attacker to overflow the stack buffer. This overflow can be exploited remotely without requiring authentication or user interaction, enabling arbitrary code execution on the device. The vulnerability is classified as high severity with a CVSS 4.0 score of 8.7, indicating a critical risk. The exploit manipulates the input to the vulnerable function to overwrite the stack, potentially allowing an attacker to execute malicious payloads, disrupt device operation, or gain persistent control. Although no active exploitation in the wild has been reported, the public availability of exploit code significantly increases the threat landscape. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous for exposed devices. The DWR-M960 is a widely deployed 4G LTE router model used in various enterprise and consumer environments, making the vulnerability relevant for a broad range of users. The absence of official patches at the time of disclosure necessitates immediate risk mitigation through network segmentation, access restrictions, and monitoring.

Potential Impact

The impact of CVE-2026-2959 is substantial for organizations relying on the D-Link DWR-M960 router. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary code with elevated privileges. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of internet connectivity, and potential pivoting to other internal systems. Confidentiality, integrity, and availability of network communications are all at risk. Given the router’s role as a network gateway, compromise could facilitate large-scale espionage, data exfiltration, or denial of service attacks. The public availability of exploit code increases the likelihood of automated attacks and widespread exploitation, especially in environments where devices are internet-facing or poorly secured. Organizations without timely mitigation may face operational disruptions, data breaches, and reputational damage.

Mitigation Recommendations

1. Immediately isolate affected D-Link DWR-M960 devices from untrusted networks, especially the internet, to reduce exposure. 2. Implement strict firewall rules to restrict access to the router’s management interfaces, allowing only trusted IP addresses. 3. Monitor network traffic for unusual patterns or attempts to access /boafrm/formNewSchedule or related endpoints. 4. Disable remote management features if not required, or restrict them to secure VPN connections. 5. Regularly audit device firmware versions and configurations to identify vulnerable devices. 6. Engage with D-Link support channels to obtain official patches or firmware updates addressing this vulnerability as soon as they become available. 7. As a temporary workaround, consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block exploit attempts targeting the vulnerable parameter. 8. Educate network administrators about the vulnerability and ensure incident response plans include steps for this specific threat. 9. Plan for device replacement if patches are unavailable or devices are end-of-life to ensure long-term security.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-22T07:19:20.670Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699b9581be58cf853bc3dfaa

Added to database: 2/22/2026, 11:47:13 PM

Last enriched: 2/23/2026, 12:01:30 AM

Last updated: 2/23/2026, 7:34:39 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats