D-Link DSL6740C v6.TR069.20211230 was discovered to use an insecure default Wifi password, possibly allowing attackers to connect to the device via a bruteforce attack.
References
Link | Resource |
---|---|
https://gist.github.com/stevenyu113228/e264c145d6e6e6b59cf53fddc27409ad#2--predictable-wifi-password-in-d-link-dsl6740c-modem | Exploit Third Party Advisory |
https://www.dlink.com/en/security-bulletin/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
07 May 2025, 15:50
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dlink
Dlink dsl-6740c Firmware Dlink dsl-6740c |
|
CPE | cpe:2.3:h:dlink:dsl-6740c:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dsl-6740c_firmware:6.tr069.20211230:*:*:*:*:*:*:* |
|
References | () https://gist.github.com/stevenyu113228/e264c145d6e6e6b59cf53fddc27409ad#2--predictable-wifi-password-in-d-link-dsl6740c-modem - Exploit, Third Party Advisory | |
References | () https://www.dlink.com/en/security-bulletin/ - Product |
Information
Published : 2024-10-30 20:15
Updated : 2025-05-07 15:50
NVD link : CVE-2024-48272
Mitre link : CVE-2024-48272
CVE.ORG link : CVE-2024-48272
JSON object : View
Products Affected
dlink
- dsl-6740c
- dsl-6740c_firmware
CWE
CWE-521
Weak Password Requirements