Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2962: Stack-based Buffer Overflow in D-Link DWR-M960

0
High
VulnerabilityCVE-2026-2962cvecve-2026-2962
Published: Mon Feb 23 2026 (02/23/2026, 00:32:11 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M960

Description

CVE-2026-2962 is a high-severity stack-based buffer overflow vulnerability found in the D-Link DWR-M960 router firmware version 1. 01. 07. It affects the Scheduled Reboot Configuration Endpoint, specifically the sub_460F30 function handling the /boafrm/formDateReboot component. An attacker can remotely exploit this vulnerability by manipulating the submit-url argument, causing a buffer overflow on the stack. This flaw does not require user interaction or prior authentication, making it remotely exploitable over the network. Although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of active attacks. Successful exploitation could lead to arbitrary code execution, compromising device integrity and availability. Organizations using this router model should prioritize patching or applying mitigations to prevent potential compromise. Countries with significant D-Link market presence and strategic infrastructure reliance on such routers are at higher risk.

AI-Powered Analysis

AILast updated: 02/23/2026, 01:16:44 UTC

Technical Analysis

CVE-2026-2962 is a stack-based buffer overflow vulnerability identified in the D-Link DWR-M960 router firmware version 1.01.07. The vulnerability resides in the Scheduled Reboot Configuration Endpoint, specifically within the sub_460F30 function that processes requests to /boafrm/formDateReboot. The flaw arises from improper handling of the submit-url argument, which can be manipulated by an attacker to overflow the stack buffer. This overflow can overwrite critical control data on the stack, potentially allowing remote attackers to execute arbitrary code or cause denial of service conditions. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its severity and ease of exploitation. The CVSS 4.0 score of 8.7 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no active exploits in the wild have been reported, a public exploit is available, which could facilitate attacks by malicious actors. The vulnerability affects a widely deployed router model used in various enterprise and consumer environments, making it a significant security concern. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

The impact of CVE-2026-2962 is substantial for organizations relying on the D-Link DWR-M960 router. Exploitation can lead to arbitrary code execution, allowing attackers to take full control of the affected device. This compromises the confidentiality of network traffic, integrity of device configurations, and availability of network services. Attackers could use the compromised router as a foothold to pivot into internal networks, conduct further attacks, or disrupt network operations. Given the router’s role in managing scheduled reboots and network connectivity, disruption could affect business continuity and critical infrastructure. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments where these routers are exposed to untrusted networks. Organizations may face data breaches, service outages, and potential regulatory consequences if the vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2026-2962, organizations should immediately check for firmware updates from D-Link addressing this vulnerability and apply them as soon as they become available. In the absence of official patches, network administrators should restrict access to the router’s management interface by implementing network segmentation and firewall rules to block external access to the /boafrm/formDateReboot endpoint. Disabling remote management features or restricting them to trusted IP addresses can reduce exposure. Monitoring network traffic for unusual requests targeting the submit-url parameter can help detect exploitation attempts. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability can provide additional defense. Regularly auditing router configurations and logs for anomalies is recommended. Finally, organizations should consider replacing affected devices with models that have a stronger security posture if patching is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-22T07:19:29.329Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699ba713be58cf853bda3048

Added to database: 2/23/2026, 1:02:11 AM

Last enriched: 2/23/2026, 1:16:44 AM

Last updated: 2/23/2026, 7:44:01 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats