First published: Thu Oct 19 2023(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** D-Link (Non-US) DSL-2750U N300 ADSL2+ and (Non-US) DSL-2730U N150 ADSL2+ are vulnerable to Incorrect Access Control. The UART/Serial interface on the PCB, provides log output and a root terminal without proper access control.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DSL-2730U Firmware | ||
Dlink Dsl-2730e Firmware | ||
All of | ||
D-Link DSL-2750U | ||
Dlink Dsl-2750b Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this D-Link router is CVE-2023-46033.
CVE-2023-46033 has a severity rating of 6.8 (medium).
The D-Link DSL-2750U N300 ADSL2+ and DSL-2730U N150 ADSL2+ routers are affected by CVE-2023-46033.
The vulnerability in D-Link routers is Incorrect Access Control.
As the vulnerability is listed as 'UNSUPPORTED WHEN ASSIGNED,' there may not be an official fix available. It is recommended to refer to the manufacturer's support announcement and website for any updates or patches.