Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48271: n/a

0
High
VulnerabilityCVE-2024-48271cvecve-2024-48271
Published: Wed Oct 30 2024 (10/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-48271 is a high-severity vulnerability affecting the D-Link DSL6740C router, specifically version v6. TR069. 20211230. The device uses insecure default administrator credentials, which can be exploited by attackers through brute force attacks to bypass authentication and escalate privileges. This vulnerability impacts confidentiality, integrity, and availability, allowing full control over the device without user interaction or prior authentication. No known public exploits exist yet, but the ease of exploitation and critical impact make it a significant threat. Organizations using this device should prioritize mitigation to prevent unauthorized access and potential network compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 08:58:05 UTC

Technical Analysis

CVE-2024-48271 identifies a critical security vulnerability in the D-Link DSL6740C router, version v6.TR069.20211230, where insecure default credentials are set for administrator access. This vulnerability falls under CWE-521, which relates to the use of hard-coded or default passwords. Attackers can exploit this by performing brute force attacks remotely, as no prior authentication or user interaction is required. The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector over the network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). Successful exploitation allows attackers to gain administrative control over the device, potentially enabling them to manipulate network traffic, intercept sensitive data, deploy malware, or disrupt network services. Although no public exploits have been reported yet, the vulnerability's nature and the widespread use of D-Link routers in residential and small business environments increase the risk of exploitation. The lack of available patches at the time of publication further exacerbates the threat, emphasizing the need for immediate mitigation steps.

Potential Impact

The vulnerability poses a significant risk to organizations and individuals using the affected D-Link DSL6740C routers. Attackers gaining administrative access can compromise network confidentiality by intercepting or redirecting traffic, integrity by altering configurations or injecting malicious payloads, and availability by disabling or disrupting network services. This can lead to data breaches, unauthorized surveillance, lateral movement within networks, and potential entry points for broader attacks. Small businesses and residential users are particularly vulnerable due to the common use of such routers and often limited security monitoring. The impact extends to ISPs and managed service providers who deploy these devices at scale, potentially affecting thousands of customers. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and widespread compromise if the vulnerability is weaponized.

Mitigation Recommendations

1. Immediately change the default administrator credentials on all affected D-Link DSL6740C devices to strong, unique passwords to prevent brute force attacks. 2. Disable remote management interfaces if not required, or restrict access to trusted IP addresses only. 3. Monitor network traffic for unusual login attempts or brute force patterns targeting router management interfaces. 4. Implement network segmentation to isolate critical systems from potentially compromised devices. 5. Regularly audit and update router firmware; although no patch is currently available, stay informed from D-Link for official updates. 6. Employ intrusion detection/prevention systems (IDS/IPS) to detect and block exploitation attempts. 7. Educate users and administrators about the risks of default credentials and enforce policies to change them upon device deployment. 8. Consider replacing affected devices with models that follow secure default credential practices if patches are delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d11b7ef31ef0b56da4f

Added to database: 2/25/2026, 9:43:45 PM

Last enriched: 2/26/2026, 8:58:05 AM

Last updated: 2/26/2026, 9:33:12 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats