Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 07 May 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink dsl-6740c
Dlink dsl-6740c Firmware |
|
| CPEs | cpe:2.3:h:dlink:dsl-6740c:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dsl-6740c_firmware:6.tr069.20211230:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink dsl-6740c
Dlink dsl-6740c Firmware |
Thu, 31 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink dsl6740c Firmware |
|
| Weaknesses | CWE-521 | |
| CPEs | cpe:2.3:o:dlink:dsl6740c_firmware:6.tr069.20211230:*:*:*:*:*:*:* | |
| Vendors & Products |
Dlink
Dlink dsl6740c Firmware |
|
| Metrics |
cvssV3_1
|
Wed, 30 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | D-Link DSL6740C v6.TR069.20211230 was discovered to use insecure default credentials for Administrator access, possibly allowing attackers to bypass authentication and escalate privileges on the device via a bruteforce attack. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-31T15:40:24.067Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48271
Updated: 2024-10-31T15:40:18.353Z
Status : Analyzed
Published: 2024-10-30T20:15:04.553
Modified: 2025-05-07T16:06:25.257
Link: CVE-2024-48271
No data.
OpenCVE Enrichment
No data.