Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2961: Stack-based Buffer Overflow in D-Link DWR-M960

0
High
VulnerabilityCVE-2026-2961cvecve-2026-2961
Published: Mon Feb 23 2026 (02/23/2026, 00:02:17 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M960

Description

CVE-2026-2961 is a high-severity stack-based buffer overflow vulnerability in the VPN Configuration Endpoint of the D-Link DWR-M960 router firmware version 1. 01. 07. The flaw exists in the function sub_4196C4 within /boafrm/formVpnConfigSetup, where manipulation of the submit-url argument can trigger the overflow. This vulnerability can be exploited remotely without authentication or user interaction, potentially allowing attackers to execute arbitrary code with elevated privileges. Although no public exploits are currently observed in the wild, the exploit code has been disclosed publicly, increasing the risk of active exploitation. The vulnerability affects the confidentiality, integrity, and availability of the device and connected networks. Organizations using this router model should prioritize patching or mitigating this issue to prevent compromise. Countries with significant deployments of D-Link networking equipment and strategic reliance on such devices are at higher risk.

AI-Powered Analysis

AILast updated: 02/23/2026, 00:46:29 UTC

Technical Analysis

CVE-2026-2961 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router, specifically in firmware version 1.01.07. The vulnerability resides in the VPN Configuration Endpoint, within the function sub_4196C4 of the /boafrm/formVpnConfigSetup component. An attacker can exploit this flaw by manipulating the submit-url parameter, which is improperly handled, leading to a stack-based buffer overflow condition. This overflow can corrupt the stack, enabling remote attackers to execute arbitrary code with elevated privileges on the device. The attack vector is network-based, requiring no authentication or user interaction, making it highly accessible to remote attackers. The vulnerability has been assigned a CVSS v4.0 score of 8.7, reflecting its critical impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure of exploit code increases the likelihood of exploitation attempts. The vulnerability affects the core VPN configuration functionality, which is critical for secure remote access, thus potentially exposing sensitive network traffic and administrative controls. No official patches or mitigation links have been provided yet, emphasizing the urgency for affected organizations to implement interim protective measures.

Potential Impact

The exploitation of CVE-2026-2961 can lead to complete compromise of the affected D-Link DWR-M960 routers. Attackers could execute arbitrary code remotely, potentially gaining administrative control over the device. This control could allow interception or manipulation of VPN traffic, disruption of network services, or pivoting into internal networks. The confidentiality of sensitive data transmitted through the VPN could be breached, integrity of network configurations compromised, and availability of network services disrupted. Organizations relying on these routers for secure remote access or critical network functions face significant operational and security risks. The ease of remote exploitation without authentication amplifies the threat, making large-scale automated attacks feasible. The absence of patches increases exposure duration, and public exploit disclosure may lead to rapid weaponization by threat actors.

Mitigation Recommendations

Given the absence of official patches, organizations should immediately implement network-level protections to mitigate exploitation risk. These include restricting access to the router’s management and VPN configuration interfaces to trusted IP addresses via firewall rules, disabling remote management if not essential, and monitoring network traffic for anomalous requests targeting the submit-url parameter or /boafrm/formVpnConfigSetup endpoint. Employing intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect buffer overflow attempts against this router model is recommended. Network segmentation should isolate affected devices from critical infrastructure to limit lateral movement if compromised. Organizations should also plan for rapid firmware updates once patches become available from D-Link. Regular backups of router configurations and incident response readiness are advised to minimize downtime and data loss in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-22T07:19:26.067Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699ba00cbe58cf853bd054b5

Added to database: 2/23/2026, 12:32:12 AM

Last enriched: 2/23/2026, 12:46:29 AM

Last updated: 2/23/2026, 7:58:46 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats