CVE-2026-2928

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_452CCC of the file /boafrm/formWlEncrypt of the component WLAN Encryption Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
References
Link Resource
https://github.com/LX-66-LX/cve-new/issues/23 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.347275 Permissions Required VDB Entry
https://vuldb.com/?id.347275 Third Party Advisory VDB Entry
https://vuldb.com/?submit.754500 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-22 05:16

Updated : 2026-02-23 19:29


NVD link : CVE-2026-2928

Mitre link : CVE-2026-2928

CVE.ORG link : CVE-2026-2928


JSON object : View

Products Affected

dlink

  • dwr-m960
  • dwr-m960_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow