CVE-2025-53755: CWE-312: Cleartext Storage of Sensitive Information in Digisol XPON ONU Wi-Fi Router (DG-GR6821AC)
This vulnerability exists in Digisol DG-GR6821AC Router due to storage of credentials and PINS without encryption in the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the unencrypted data stored in the firmware of targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the network of the targeted device.
AI Analysis
Technical Summary
CVE-2025-53755 is a medium-severity vulnerability affecting the Digisol XPON ONU Wi-Fi Router model DG-GR6821AC, specifically firmware version V3.2.XX. The core issue is the cleartext storage of sensitive information, including credentials and PINs, within the device firmware. This vulnerability is categorized under CWE-312, which relates to the insecure storage of sensitive data. An attacker with physical access to the device can extract the firmware and reverse engineer the binary data to retrieve unencrypted credentials. Since the credentials are stored without encryption, this significantly lowers the barrier for an attacker to gain unauthorized access to the network managed by the router. The CVSS 4.0 vector indicates that the attack requires physical access (AV:P), has low attack complexity (AC:L), does not require authentication (PR:N), and no user interaction (UI:N). The vulnerability impacts confidentiality severely (VC:H) but does not affect integrity or availability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability is particularly concerning because physical access to network devices is often possible in environments such as offices, data centers, or multi-tenant buildings, making it a realistic threat vector for attackers with insider access or physical proximity. The lack of encryption for stored credentials is a fundamental security design flaw in the affected firmware version, exposing networks to potential unauthorized access and subsequent lateral movement or data exfiltration.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in sectors where physical security of network infrastructure may be less stringent, such as small to medium enterprises, educational institutions, or shared office spaces. Unauthorized access to the network via compromised router credentials can lead to interception of sensitive communications, unauthorized network configuration changes, and potential pivoting to other internal systems. Given the router’s role as a network gateway, exploitation could undermine confidentiality of internal data flows and potentially disrupt business operations if attackers leverage access for further attacks. The medium CVSS score reflects that while remote exploitation is not possible, the impact of a successful attack is substantial. Organizations in Europe with deployments of Digisol XPON ONU Wi-Fi Routers, particularly in environments where physical access controls are weak, should be vigilant. The vulnerability also raises compliance concerns under regulations such as GDPR, as unauthorized network access could lead to personal data breaches. Furthermore, the absence of patches means organizations must rely on compensating controls until a firmware update is available.
Mitigation Recommendations
1. Enforce strict physical security controls around network infrastructure to prevent unauthorized physical access to routers. 2. Inventory all Digisol DG-GR6821AC devices and verify firmware versions; avoid deploying or replace devices running vulnerable firmware V3.2.XX where possible. 3. Monitor network access logs for unusual activity that could indicate unauthorized access. 4. Segment networks to limit the impact of compromised devices, ensuring that critical systems are isolated from general user networks. 5. If physical access is suspected or confirmed, consider device replacement or re-flashing with updated firmware once available. 6. Engage with Digisol support channels to obtain information on forthcoming patches or firmware updates addressing this vulnerability. 7. Implement network-level authentication and encryption (e.g., WPA3, VPNs) to reduce the risk of unauthorized access even if router credentials are compromised. 8. Educate staff about the risks of physical device tampering and encourage reporting of suspicious activities around network hardware.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2025-53755: CWE-312: Cleartext Storage of Sensitive Information in Digisol XPON ONU Wi-Fi Router (DG-GR6821AC)
Description
This vulnerability exists in Digisol DG-GR6821AC Router due to storage of credentials and PINS without encryption in the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the unencrypted data stored in the firmware of targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the network of the targeted device.
AI-Powered Analysis
Technical Analysis
CVE-2025-53755 is a medium-severity vulnerability affecting the Digisol XPON ONU Wi-Fi Router model DG-GR6821AC, specifically firmware version V3.2.XX. The core issue is the cleartext storage of sensitive information, including credentials and PINs, within the device firmware. This vulnerability is categorized under CWE-312, which relates to the insecure storage of sensitive data. An attacker with physical access to the device can extract the firmware and reverse engineer the binary data to retrieve unencrypted credentials. Since the credentials are stored without encryption, this significantly lowers the barrier for an attacker to gain unauthorized access to the network managed by the router. The CVSS 4.0 vector indicates that the attack requires physical access (AV:P), has low attack complexity (AC:L), does not require authentication (PR:N), and no user interaction (UI:N). The vulnerability impacts confidentiality severely (VC:H) but does not affect integrity or availability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability is particularly concerning because physical access to network devices is often possible in environments such as offices, data centers, or multi-tenant buildings, making it a realistic threat vector for attackers with insider access or physical proximity. The lack of encryption for stored credentials is a fundamental security design flaw in the affected firmware version, exposing networks to potential unauthorized access and subsequent lateral movement or data exfiltration.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in sectors where physical security of network infrastructure may be less stringent, such as small to medium enterprises, educational institutions, or shared office spaces. Unauthorized access to the network via compromised router credentials can lead to interception of sensitive communications, unauthorized network configuration changes, and potential pivoting to other internal systems. Given the router’s role as a network gateway, exploitation could undermine confidentiality of internal data flows and potentially disrupt business operations if attackers leverage access for further attacks. The medium CVSS score reflects that while remote exploitation is not possible, the impact of a successful attack is substantial. Organizations in Europe with deployments of Digisol XPON ONU Wi-Fi Routers, particularly in environments where physical access controls are weak, should be vigilant. The vulnerability also raises compliance concerns under regulations such as GDPR, as unauthorized network access could lead to personal data breaches. Furthermore, the absence of patches means organizations must rely on compensating controls until a firmware update is available.
Mitigation Recommendations
1. Enforce strict physical security controls around network infrastructure to prevent unauthorized physical access to routers. 2. Inventory all Digisol DG-GR6821AC devices and verify firmware versions; avoid deploying or replace devices running vulnerable firmware V3.2.XX where possible. 3. Monitor network access logs for unusual activity that could indicate unauthorized access. 4. Segment networks to limit the impact of compromised devices, ensuring that critical systems are isolated from general user networks. 5. If physical access is suspected or confirmed, consider device replacement or re-flashing with updated firmware once available. 6. Engage with Digisol support channels to obtain information on forthcoming patches or firmware updates addressing this vulnerability. 7. Implement network-level authentication and encryption (e.g., WPA3, VPNs) to reduce the risk of unauthorized access even if router credentials are compromised. 8. Educate staff about the risks of physical device tampering and encourage reporting of suspicious activities around network hardware.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-In
- Date Reserved
- 2025-07-09T11:17:31.820Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68778d7fa83201eaacda0607
Added to database: 7/16/2025, 11:31:11 AM
Last enriched: 7/16/2025, 11:46:44 AM
Last updated: 7/16/2025, 11:46:44 AM
Views: 2
Related Threats
CVE-2025-53758: CWE-312: Cleartext Storage of Sensitive Information in Digisol XPON ONU Wi-Fi Router (DG-GR6821AC)
MediumCVE-2025-53757: CWE-614: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in Digisol XPON ONU Wi-Fi Router (DG-GR6821AC)
HighCVE-2025-52836: CWE-266 Incorrect Privilege Assignment in Unity Business Technology Pty Ltd The E-Commerce ERP
CriticalCVE-2025-52819: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pakkemx Pakke Envíos
HighCVE-2025-52804: CWE-862 Missing Authorization in uxper Nuss
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.