We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53758

Default Credential Vulnerability in Digisol DG-GR6821AC Router



Description

This vulnerability exists in Digisol DG-GR6821AC Router due to use of default admin credentials at its web management interface. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the hardcoded default credentials stored in the firmware of the targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device.

Reserved 2025-07-09 | Published 2025-07-16 | Updated 2025-07-16 | Assigner CERT-In


MEDIUM: 5.1CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-312: Cleartext Storage of Sensitive Information

Product status

Default status
unaffected

V3.2.XX
affected

Credits

This vulnerability is reported by Shravan Singh from Kavach IoT Security. finder

References

www.cert-in.org.in/...eid=PUBVLNOTES01&VLCODE=CIVN-2025-0147 third-party-advisory

cve.org (CVE-2025-53758)

nvd.nist.gov (CVE-2025-53758)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53758

Support options

Helpdesk Chat, Email, Knowledgebase