CVE-2026-2929
Published: 22 February 2026
Summary
CVE-2026-2929 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Dlink Dwr-M960 Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 4.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validating the submit-url argument in the /boafrm/formWlAc Wireless Access Control Endpoint directly prevents the stack-based buffer overflow triggered by malicious input manipulation.
Memory protection mechanisms such as stack canaries, ASLR, and DEP safeguard against stack-based buffer overflows in functions like sub_453140.
Timely flaw remediation through firmware patching directly addresses and corrects the buffer overflow vulnerability in D-Link DWR-M960 version 1.01.07.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack buffer overflow in public web management interface (formWlAc) with PR:L allows RCE; directly maps to exploiting public-facing apps for initial/privileged access and priv-esc via vulnerable component.
NVD Description
A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_453140 of the file /boafrm/formWlAc of the component Wireless Access Control Endpoint. This manipulation of the argument submit-url causes stack-based buffer overflow. Remote exploitation of the attack is…
more
possible. The exploit has been publicly disclosed and may be utilized.
Deeper analysisAI
CVE-2026-2929 is a stack-based buffer overflow vulnerability affecting the D-Link DWR-M960 router on firmware version 1.01.07. The flaw resides in the function sub_453140 within the file /boafrm/formWlAc of the Wireless Access Control Endpoint component, triggered by manipulation of the submit-url argument. It is classified under CWE-119 and CWE-121.
Remote exploitation is possible by an attacker with low privileges (PR:L), requiring network access with low complexity and no user interaction, per the CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Successful exploitation can compromise confidentiality, integrity, and availability to a high degree, potentially enabling remote code execution on the affected device.
Advisories and additional details are documented in references including VulDB entries (ctiid.347276, id.347276, submit.754503), a GitHub issue at LX-66-LX/cve-new/issues/24, and the D-Link website.
The exploit has been publicly disclosed and may be utilized, heightening the risk for unpatched devices.
Details
- CWE(s)