First published: Thu Oct 19 2023(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** D-Link (Non-US) DSL-2750U N300 ADSL2+ and (Non-US) DSL-2730U N150 ADSL2+ are vulnerable to Incorrect Access Control. The UART/Serial interface on the PCB, provides log output and a root terminal without proper access control.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Dlink Dsl-2730u Firmware | ||
Dlink Dsl-2730u | ||
All of | ||
Dlink Dsl-2750u Firmware | ||
Dlink Dsl-2750u |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this D-Link router is CVE-2023-46033.
CVE-2023-46033 has a severity rating of 6.8 (medium).
The D-Link DSL-2750U N300 ADSL2+ and DSL-2730U N150 ADSL2+ routers are affected by CVE-2023-46033.
The vulnerability in D-Link routers is Incorrect Access Control.
As the vulnerability is listed as 'UNSUPPORTED WHEN ASSIGNED,' there may not be an official fix available. It is recommended to refer to the manufacturer's support announcement and website for any updates or patches.