This vulnerability exists in Digisol DG-GR6821AC Router due to use of default admin credentials at its web management interface. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the hardcoded default credentials stored in the firmware of the targeted device.
Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Wed, 16 Jul 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Jul 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability exists in Digisol DG-GR6821AC Router due to use of default admin credentials at its web management interface. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the hardcoded default credentials stored in the firmware of the targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device. | |
Title | Default Credential Vulnerability in Digisol DG-GR6821AC Router | |
Weaknesses | CWE-312 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-In
Published: 2025-07-16T11:29:12.703Z
Updated: 2025-07-16T13:01:22.676Z
Reserved: 2025-07-09T11:17:31.820Z
Link: CVE-2025-53758

Updated: 2025-07-16T13:01:19.532Z

Status : Awaiting Analysis
Published: 2025-07-16T12:15:30.493
Modified: 2025-07-16T14:58:59.837
Link: CVE-2025-53758

No data.