CVE-2026-2929

8.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-url parameter in the Wireless Access Control endpoint. This affects D-Link DWR-M960 routers running firmware version 1.01.07. Remote exploitation is possible without authentication.

💻 Affected Systems

Products:
  • D-Link DWR-M960
Versions: 1.01.07
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Wireless Access Control endpoint specifically. All devices running the vulnerable firmware version are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network infiltration, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Remote code execution allowing attackers to gain control of the router, modify network settings, intercept traffic, or use as pivot point for further attacks.

🟢

If Mitigated

Denial of service or limited impact if proper network segmentation and access controls prevent exploitation.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication on internet-facing devices.
🏢 Internal Only: MEDIUM - Still exploitable from internal networks but requires attacker presence on the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed on GitHub, making weaponization likely. The vulnerability is in a web interface component accessible remotely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.dlink.com/

Restart Required: Yes

Instructions:

1. Check D-Link website for firmware updates. 2. Download latest firmware for DWR-M960. 3. Log into router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router after update completes.

🔧 Temporary Workarounds

Disable Wireless Access Control Interface

all

Disable or restrict access to the vulnerable endpoint if not needed

Network Segmentation

all

Isolate affected routers from critical networks and internet exposure

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to the router's web interface
  • Deploy network-based intrusion prevention systems (IPS) to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface. Navigate to System > Firmware Information and verify version is 1.01.07.

Check Version:

No CLI command available. Must use web interface at http://[router-ip]/boafrm/formWlAc (but do not test exploitation)

Verify Fix Applied:

After updating, verify firmware version shows a version higher than 1.01.07 in the admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /boafrm/formWlAc with long submit-url parameters
  • Router crash or reboot logs
  • Unusual process execution in router logs

Network Indicators:

  • HTTP requests with abnormally long submit-url parameters to router IP
  • Traffic patterns suggesting router compromise (unexpected outbound connections)

SIEM Query:

source="router_logs" AND (uri="/boafrm/formWlAc" AND content_length>1000) OR (event="crash" AND device="DWR-M960")

🔗 References

📤 Share & Export