Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink dwr-m960 Dlink dwr-m960 Firmware |
|
| CPEs | cpe:2.3:h:dlink:dwr-m960:b1:*:*:*:*:*:*:* cpe:2.3:o:dlink:dwr-m960_firmware:1.01.07:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink dwr-m960 Dlink dwr-m960 Firmware |
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link dwr-m960 |
|
| Vendors & Products |
D-link
D-link dwr-m960 |
Sun, 22 Feb 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_452CCC of the file /boafrm/formWlEncrypt of the component WLAN Encryption Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. | |
| Title | D-Link DWR-M960 WLAN Encryption Configuration Endpoint formWlEncrypt sub_452CCC stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-27T18:12:06.940Z
Reserved: 2026-02-21T04:58:36.992Z
Link: CVE-2026-2928
Updated: 2026-02-27T18:12:03.004Z
Status : Analyzed
Published: 2026-02-22T05:16:19.303
Modified: 2026-02-23T19:29:03.767
Link: CVE-2026-2928
No data.
OpenCVE Enrichment
Updated: 2026-04-16T16:45:25Z