D-Link (Non-US) DSL-2750U N300 ADSL2+ and (Non-US) DSL-2730U N150 ADSL2+ are vulnerable to Incorrect Access Control. The UART/Serial interface on the PCB, provides log output and a root terminal without proper access control.
References
Configurations
History
21 Nov 2024, 08:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10357 - Product | |
References | () https://www.dlink.com/en/products/dsl-2730u-wireless-n150-adsl2-router - Product | |
References | () https://www.dlink.com/en/products/dsl-2750u-wireless-n-300-adsl2-modem-router - Product |
12 Sep 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-284 |
21 Mar 2024, 02:49
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-19 16:15
Updated : 2024-11-21 08:27
NVD link : CVE-2023-46033
Mitre link : CVE-2023-46033
CVE.ORG link : CVE-2023-46033
JSON object : View
Products Affected
dlink
- dsl-2750u_firmware
- dsl-2730u_firmware
- dsl-2750u
- dsl-2730u
CWE