• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10474
(non-US) DWR-960 : H/W Rev. B : F/W v1.01: Multiple Vulnerabilities
Publication ID: SAP10474
Resolved Status: Partial
Published on: 1 November 2025 4:27 GMT
Last updated on: 29 January 2026 10:27 GMT

Overview

 

 On July 20, 2025, a third party reported vulnerabilities in the DWR-960 Mobile Router hardware revision Ax, with firmware version 1.01 RevB1, dated 09/12/2021 or earlier.  These issues allow unauthorized access to configuration files, administrative credentials, and remote system access without authentication.

 

When D-Link became aware of the reported security issues, we promptly started investigating and developing security patches. Patches were released within 90 days of the vulnerability report.

 

D-Link takes network security and user privacy very seriously. We have a dedicated task force and product management team available to address evolving security issues and implement necessary security measures. 

 

Report information  

 

      3rd Party Report    Nicolas GOLLET  nicolas _dot_ gollet _at_ nginfo _dot_ fr

 


                 Vulnerability 1: Unauthenticated Configuration File Disclosure - Mitigated by v.1.0.1.5 linked below

                                     - Description: The endpoint `http://192.168.0.1/cfg/all exposes sensitive system configuration files without authentication if the backup feature has been used at least once.


                Vulnerability 2: Unauthenticated Telnet Service Activation - Mitigated by v.1.0.1.5 linked below

                                    - Description: Two unauthenticated endpoints allow activation and deactivation of Telnet across all interfaces


               Vulnerability 3: Administrative Credential Disclosure - Under further Research

                                      Critical (CVSS 9.1)                                        

                                    - Description: The router exposes administrative credentials through an unauthenticated API endpoint.


              Vulnerability 4: WiFi Configuration Disclosure - Under further Research

                                      Critical (CVSS 9.3)                                        

                                    - Description: Complete WiFi configuration, including WPA/WPA2 passphrases, is exposed without authentication.


              Vulnerability 5: System Information Disclosure - Under further Research

                                      Critical (CVSS 7.5)                                        

                                   - Description: Multiple system endpoints leak sensitive device and network information.


 

Affected Models

 

Model

Affected Software Version

Region

Fixed Release

Last Updated

DWR-960

.01 RevB1, dated 09/12/2021 or earlier

Global

V1.0.1.5

09/01/2025

 

 Regarding the Security Update for Your D-Link Device

 

Installing software updates is critical in addressing security vulnerabilities in your D-Link devices. D-Link strongly urges all users to install the relevant updates and regularly check for further updates. After downloading the software update, it is essential to ALWAYS validate its success by comparing the software version on your product interface to the software update version.

 

Please note that beta software, beta firmware, or a hot-fix release is still undergoing rigorous testing before its official release. This ensures that the software is of the highest quality and meets our stringent standards. However, it is essential to understand that the user assumes all risk and liability for its use. D-Link does not provide express or implied warranties regarding the suitability or usability of the beta software, beta firmware, or hot-fix release. D-Link will not be liable for any direct, indirect, special, or consequential loss suffered by any party due to their use of the beta firmware, beta software, or hit-fix release.

 

NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.