CVE-2026-2959: Stack-based Buffer Overflow in D-Link DWR-M960
CVE-2026-2959 is a high-severity stack-based buffer overflow vulnerability in the D-Link DWR-M960 router firmware version 1. 01. 07. The flaw exists in the function sub_44E0F8 within /boafrm/formNewSchedule, where manipulation of the 'url' argument can trigger the overflow. This vulnerability allows remote attackers to execute arbitrary code without authentication or user interaction. The exploit code is publicly available, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The vulnerability has a CVSS 4. 0 score of 8. 7, reflecting its critical impact on confidentiality, integrity, and availability. Organizations using this router model are at risk of remote compromise, potentially leading to full device takeover.
AI Analysis
Technical Summary
CVE-2026-2959 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The vulnerability resides in the function sub_44E0F8 within the /boafrm/formNewSchedule file, where improper handling of the 'url' parameter allows an attacker to overflow the stack buffer. This overflow can be exploited remotely without requiring authentication or user interaction, enabling arbitrary code execution on the device. The vulnerability is classified as high severity with a CVSS 4.0 score of 8.7, indicating a critical risk. The exploit manipulates the input to the vulnerable function to overwrite the stack, potentially allowing an attacker to execute malicious payloads, disrupt device operation, or gain persistent control. Although no active exploitation in the wild has been reported, the public availability of exploit code significantly increases the threat landscape. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous for exposed devices. The DWR-M960 is a widely deployed 4G LTE router model used in various enterprise and consumer environments, making the vulnerability relevant for a broad range of users. The absence of official patches at the time of disclosure necessitates immediate risk mitigation through network segmentation, access restrictions, and monitoring.
Potential Impact
The impact of CVE-2026-2959 is substantial for organizations relying on the D-Link DWR-M960 router. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary code with elevated privileges. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of internet connectivity, and potential pivoting to other internal systems. Confidentiality, integrity, and availability of network communications are all at risk. Given the router’s role as a network gateway, compromise could facilitate large-scale espionage, data exfiltration, or denial of service attacks. The public availability of exploit code increases the likelihood of automated attacks and widespread exploitation, especially in environments where devices are internet-facing or poorly secured. Organizations without timely mitigation may face operational disruptions, data breaches, and reputational damage.
Mitigation Recommendations
1. Immediately isolate affected D-Link DWR-M960 devices from untrusted networks, especially the internet, to reduce exposure. 2. Implement strict firewall rules to restrict access to the router’s management interfaces, allowing only trusted IP addresses. 3. Monitor network traffic for unusual patterns or attempts to access /boafrm/formNewSchedule or related endpoints. 4. Disable remote management features if not required, or restrict them to secure VPN connections. 5. Regularly audit device firmware versions and configurations to identify vulnerable devices. 6. Engage with D-Link support channels to obtain official patches or firmware updates addressing this vulnerability as soon as they become available. 7. As a temporary workaround, consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block exploit attempts targeting the vulnerable parameter. 8. Educate network administrators about the vulnerability and ensure incident response plans include steps for this specific threat. 9. Plan for device replacement if patches are unavailable or devices are end-of-life to ensure long-term security.
Affected Countries
United States, Germany, United Kingdom, Australia, Canada, India, Brazil, Japan, South Korea, France, Italy, Spain
CVE-2026-2959: Stack-based Buffer Overflow in D-Link DWR-M960
Description
CVE-2026-2959 is a high-severity stack-based buffer overflow vulnerability in the D-Link DWR-M960 router firmware version 1. 01. 07. The flaw exists in the function sub_44E0F8 within /boafrm/formNewSchedule, where manipulation of the 'url' argument can trigger the overflow. This vulnerability allows remote attackers to execute arbitrary code without authentication or user interaction. The exploit code is publicly available, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The vulnerability has a CVSS 4. 0 score of 8. 7, reflecting its critical impact on confidentiality, integrity, and availability. Organizations using this router model are at risk of remote compromise, potentially leading to full device takeover.
AI-Powered Analysis
Technical Analysis
CVE-2026-2959 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The vulnerability resides in the function sub_44E0F8 within the /boafrm/formNewSchedule file, where improper handling of the 'url' parameter allows an attacker to overflow the stack buffer. This overflow can be exploited remotely without requiring authentication or user interaction, enabling arbitrary code execution on the device. The vulnerability is classified as high severity with a CVSS 4.0 score of 8.7, indicating a critical risk. The exploit manipulates the input to the vulnerable function to overwrite the stack, potentially allowing an attacker to execute malicious payloads, disrupt device operation, or gain persistent control. Although no active exploitation in the wild has been reported, the public availability of exploit code significantly increases the threat landscape. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous for exposed devices. The DWR-M960 is a widely deployed 4G LTE router model used in various enterprise and consumer environments, making the vulnerability relevant for a broad range of users. The absence of official patches at the time of disclosure necessitates immediate risk mitigation through network segmentation, access restrictions, and monitoring.
Potential Impact
The impact of CVE-2026-2959 is substantial for organizations relying on the D-Link DWR-M960 router. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary code with elevated privileges. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of internet connectivity, and potential pivoting to other internal systems. Confidentiality, integrity, and availability of network communications are all at risk. Given the router’s role as a network gateway, compromise could facilitate large-scale espionage, data exfiltration, or denial of service attacks. The public availability of exploit code increases the likelihood of automated attacks and widespread exploitation, especially in environments where devices are internet-facing or poorly secured. Organizations without timely mitigation may face operational disruptions, data breaches, and reputational damage.
Mitigation Recommendations
1. Immediately isolate affected D-Link DWR-M960 devices from untrusted networks, especially the internet, to reduce exposure. 2. Implement strict firewall rules to restrict access to the router’s management interfaces, allowing only trusted IP addresses. 3. Monitor network traffic for unusual patterns or attempts to access /boafrm/formNewSchedule or related endpoints. 4. Disable remote management features if not required, or restrict them to secure VPN connections. 5. Regularly audit device firmware versions and configurations to identify vulnerable devices. 6. Engage with D-Link support channels to obtain official patches or firmware updates addressing this vulnerability as soon as they become available. 7. As a temporary workaround, consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block exploit attempts targeting the vulnerable parameter. 8. Educate network administrators about the vulnerability and ensure incident response plans include steps for this specific threat. 9. Plan for device replacement if patches are unavailable or devices are end-of-life to ensure long-term security.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-22T07:19:20.670Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699b9581be58cf853bc3dfaa
Added to database: 2/22/2026, 11:47:13 PM
Last enriched: 2/23/2026, 12:01:30 AM
Last updated: 2/23/2026, 7:34:39 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2977: Unrestricted Upload in FastApiAdmin
MediumCVE-2026-1367: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Zohocorp ManageEngine ADSelfService Plus
HighCVE-2026-2976: Information Disclosure in FastApiAdmin
MediumCVE-2026-2975: Information Disclosure in FastApiAdmin
MediumCVE-2026-2974: Exposure of Backup File to an Unauthorized Control Sphere in AliasVault App
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.