Description
This vulnerability exists in Digisol DG-GR6821AC Router due to cleartext transmission of credentials in its web management interface. A remote attacker could exploit this vulnerability by intercepting the network traffic and capturing cleartext credentials.

Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device.
Published: 2025-07-16
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade Digisol DG-GR6821AC Router firmware to version HG323DACv5_all_V3.2.02-250509_Digisolver

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21643 This vulnerability exists in Digisol DG-GR6821AC Router due to cleartext transmission of credentials in its web management interface. A remote attacker could exploit this vulnerability by intercepting the network traffic and capturing cleartext credentials. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device.
History

Wed, 16 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0022}


Wed, 16 Jul 2025 11:30:00 +0000

Type Values Removed Values Added
Description This vulnerability exists in Digisol DG-GR6821AC Router due to cleartext transmission of credentials in its web management interface. A remote attacker could exploit this vulnerability by intercepting the network traffic and capturing cleartext credentials. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device.
Title Cleartext Transmission Vulnerability in Digisol DG-GR6821AC Router
Weaknesses CWE-319
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published:

Updated: 2025-07-16T18:51:21.505Z

Reserved: 2025-07-09T11:17:31.820Z

Link: CVE-2025-53756

cve-icon Vulnrichment

Updated: 2025-07-16T18:51:13.948Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-16T12:15:30.227

Modified: 2025-07-16T14:58:59.837

Link: CVE-2025-53756

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses