CVE DATABASE / CVE-2011-4723
CVE-2011-4723
D-Link DIR-300 Router Cleartext Storage of a Password Vulnerability
CVSS 5.7 · MEDIUM
⚠ CISA KEV — ACTIVELY EXPLOITED
On the CISA KEV catalog
Confirmed exploited in the wild. Added 2022-09-08.
Federal remediation due 2022-09-29.
Required action: The impacted product is end-of-life and should be disconnected if still in use.
Summary
The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information via unspecified vectors.
CVSS 3.1 breakdown
| Base score | 5.7 (MEDIUM) |
| Vector | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
| Attack vector | ADJACENT_NETWORK |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity | NONE |
| Availability | NONE |
Weakness type (CWE)
Affected products
Dlink dir-300 firmwareDlink dir-300
Check this CVE live
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- http://en.securitylab.ru/lab/PT-2011-30
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2011-4723
Data: NIST NVD + CISA KEV. NVD last modified 2026-04-22. Always verify against the vendor advisory before acting.