Impact
Across DR-810 firmware contains a flaw that lets an attacker issue a simple HTTP GET request to the rom-0 endpoint. The request is accepted without any authentication, causing the router to send the compressed backup file that includes configuration data such as router passwords and other sensitive settings. This exposure aligns with CWE‑538, which describes the unintended release of sensitive information to unauthorized parties. The result is that confidentiality of the device’s credentials and configuration is compromised, potentially enabling full control of the device.
Affected Systems
The affected product is the Across DR‑810 router firmware, specifically the rom‑0 backup functionality. Any device running this firmware version that exposes the management interface to a network is vulnerable.
Risk and Exploitability
The CVSS score of 8.7 marks this vulnerability as high severity. No authentication is required, and the exploit can be carried out by sending a single GET request to the exposed endpoint, making it highly likely to be exploited by remote attackers. The EPSS score is not available, and the vulnerability is not listed in CISA's KEV catalog, but the lack of authentication and the simple payload provide a straightforward attack path. At high impact, an unauthorized party can obtain router configuration and passwords, paving the way for further compromises.
OpenCVE Enrichment