Skip to main content

CVE-2025-53758: CWE-312: Cleartext Storage of Sensitive Information in Digisol XPON ONU Wi-Fi Router (DG-GR6821AC)

Medium
VulnerabilityCVE-2025-53758cvecve-2025-53758cwe-312
Published: Wed Jul 16 2025 (07/16/2025, 11:29:12 UTC)
Source: CVE Database V5
Vendor/Project: Digisol
Product: XPON ONU Wi-Fi Router (DG-GR6821AC)

Description

This vulnerability exists in Digisol DG-GR6821AC Router due to use of default admin credentials at its web management interface. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the hardcoded default credentials stored in the firmware of the targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device.

AI-Powered Analysis

AILast updated: 07/16/2025, 12:02:59 UTC

Technical Analysis

CVE-2025-53758 is a medium-severity vulnerability affecting the Digisol XPON ONU Wi-Fi Router model DG-GR6821AC, specifically version V3.2.XX of its firmware. The root cause of this vulnerability is the use of default administrative credentials that are hardcoded and stored in cleartext within the device's firmware. An attacker with physical access to the device can extract the firmware image and reverse engineer the binary data to retrieve these default credentials. This vulnerability is categorized under CWE-312, which pertains to the cleartext storage of sensitive information. Exploiting this flaw does not require network access or user interaction, but physical access is mandatory. Once the attacker obtains the default admin credentials, they can gain unauthorized access to the router's web management interface, potentially allowing them to alter device configurations, intercept or redirect network traffic, or further compromise connected devices. The CVSS 4.0 vector indicates the attack vector is physical (AV:P), with low attack complexity (AC:L), no privileges or user interaction required, but with high impact on confidentiality (VC:H) and no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been released yet. This vulnerability highlights poor security design in embedded device firmware, where sensitive credentials are stored insecurely and not randomized or protected by encryption or secure storage mechanisms.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for enterprises or service providers deploying Digisol XPON ONU Wi-Fi Routers in their network infrastructure. Unauthorized access to the router's management interface could lead to compromise of network configurations, interception of sensitive communications, and lateral movement within internal networks. This is particularly critical for organizations handling sensitive personal data under GDPR, as unauthorized access could result in data breaches and regulatory penalties. The requirement for physical access somewhat limits remote exploitation, but insider threats or attackers with physical proximity (e.g., in shared office spaces or multi-tenant buildings) could exploit this vulnerability. Additionally, compromised routers could be used as footholds for launching further attacks or as part of botnets. The lack of available patches increases the risk window. The vulnerability also undermines trust in network infrastructure devices, potentially affecting operational continuity and data confidentiality.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately audit all Digisol DG-GR6821AC routers to identify affected firmware versions. 2) Replace default administrative credentials with strong, unique passwords on all devices. 3) Restrict physical access to networking equipment by securing server rooms and network closets with controlled access mechanisms. 4) Monitor network traffic for unusual activity that could indicate unauthorized access or configuration changes. 5) If possible, disable or limit web management interface access to trusted management networks or via VPN. 6) Engage with Digisol support to request firmware updates or patches addressing this vulnerability. 7) Consider deploying network segmentation to isolate vulnerable devices from critical infrastructure. 8) Implement regular firmware integrity checks to detect unauthorized modifications. 9) Train staff on the risks of physical device tampering and enforce strict device handling policies. These measures go beyond generic advice by focusing on physical security, credential management, network segmentation, and proactive monitoring tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-In
Date Reserved
2025-07-09T11:17:31.820Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6877910aa83201eaacda58f8

Added to database: 7/16/2025, 11:46:18 AM

Last enriched: 7/16/2025, 12:02:59 PM

Last updated: 8/27/2025, 7:01:55 PM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats