First published: Tue Dec 20 2011(Updated: )
The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information via unspecified vectors.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-300 | ||
D-Link DIR-300 | ||
The impacted product is end-of-life and should be disconnected if still in use.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4723 has a moderate severity level due to the exposure of cleartext passwords.
To fix CVE-2011-4723, you should update the D-Link DIR-300 router to the latest firmware version provided by the manufacturer.
CVE-2011-4723 can be exploited by context-dependent attackers aiming to access sensitive information stored in cleartext.
CVE-2011-4723 specifically affects the D-Link DIR-300 router.
A possible workaround for CVE-2011-4723 is to restrict access to the router's management interface and avoid storing sensitive information in cleartext.