This vulnerability exists in Digisol DG-GR6821AC Router due to use of default admin credentials at its web management interface. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the hardcoded default credentials stored in the firmware of the targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00026}


Wed, 16 Jul 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 11:45:00 +0000

Type Values Removed Values Added
Description This vulnerability exists in Digisol DG-GR6821AC Router due to use of default admin credentials at its web management interface. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the hardcoded default credentials stored in the firmware of the targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device.
Title Default Credential Vulnerability in Digisol DG-GR6821AC Router
Weaknesses CWE-312
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published: 2025-07-16T11:29:12.703Z

Updated: 2025-07-16T13:01:22.676Z

Reserved: 2025-07-09T11:17:31.820Z

Link: CVE-2025-53758

cve-icon Vulnrichment

Updated: 2025-07-16T13:01:19.532Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-16T12:15:30.493

Modified: 2025-07-16T14:58:59.837

Link: CVE-2025-53758

cve-icon Redhat

No data.