CVE-2024-48272

D-Link DSL6740C v6.TR069.20211230 was discovered to use an insecure default Wifi password, possibly allowing attackers to connect to the device via a bruteforce attack.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dsl-6740c_firmware:6.tr069.20211230:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dsl-6740c:-:*:*:*:*:*:*:*

History

07 May 2025, 15:50

Type Values Removed Values Added
First Time Dlink
Dlink dsl-6740c Firmware
Dlink dsl-6740c
CPE cpe:2.3:h:dlink:dsl-6740c:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dsl-6740c_firmware:6.tr069.20211230:*:*:*:*:*:*:*
References () https://gist.github.com/stevenyu113228/e264c145d6e6e6b59cf53fddc27409ad#2--predictable-wifi-password-in-d-link-dsl6740c-modem - () https://gist.github.com/stevenyu113228/e264c145d6e6e6b59cf53fddc27409ad#2--predictable-wifi-password-in-d-link-dsl6740c-modem - Exploit, Third Party Advisory
References () https://www.dlink.com/en/security-bulletin/ - () https://www.dlink.com/en/security-bulletin/ - Product

Information

Published : 2024-10-30 20:15

Updated : 2025-05-07 15:50


NVD link : CVE-2024-48272

Mitre link : CVE-2024-48272

CVE.ORG link : CVE-2024-48272


JSON object : View

Products Affected

dlink

  • dsl-6740c
  • dsl-6740c_firmware
CWE
CWE-521

Weak Password Requirements