[CIVN-2025-0147] Multiple Vulnerabilities in Digisol XPON ONU Wi-Fi Router
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Digisol XPON ONU Wi-Fi Router
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Systems Affected
Digisol XPON ONU Wi-Fi Router (DG-GR6821AC) – Firmware version : V3.2.XX
Overview
Multiple vulnerabilities have been reported in Digisol DG-GR6821AC Router, which could allow an attacker to perform session hijacking, Man-in-the-Middle (MITM) attack or gain unauthorized access to sensitive information of the targeted device.
Target Audience:
End-users/ Administrators of Digisol DG-GR6821AC Router
Risk Assessment:
Risk of session hijacking, Man-in-the-Middle (MITM) attack and exposure of sensitive information.
Impact Assessment:
Impact on confidentiality, integrity and availability of the vulnerable device.
Description
Digisol XPON ONU Wi-Fi Router (DG-GR6821AC) is a dual mode Optical Network Unit (ONU) working on both GPON and Gigabit EPON technology which can detect and exchange PON mode automatically.
1. Hard-coded Credentials Vulnerability ( CVE-2025-53754 )
This vulnerability exists in Digisol DG-GR6821AC Router due to hard-coded Root Access Credentials in system configuration of the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to obtain the stored root access credentials.
Successful exploitation of this vulnerability could allow the attacker to gain admin access to the targeted device.
2. Cleartext Storage Vulnerability ( CVE-2025-53755 )
This vulnerability exists in Digisol DG-GR6821AC Router due to storage of credentials and PINS without encryption in the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the unencrypted data stored in the firmware of targeted device.
Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the network of the targeted device.
3. Cleartext Transmission Vulnerability ( CVE-2025-53756 )
This vulnerability exists in Digisol DG-GR6821AC Router due to cleartext transmission of credentials in its web management interface. A remote attacker could exploit this vulnerability by intercepting the network traffic and capturing cleartext credentials.
Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device.
4. Insecure Cookie Flags Vulnerability ( CVE-2025-53757 )
This vulnerability exists in Digisol DG-GR6821AC Router due to misconfiguration of both Secure and HttpOnly flags on session cookies associated with the router web interface. A remote attacker could exploit this vulnerability by capturing the session cookies transmitted over an unsecure HTTP connection. Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information from the targeted device.
5. Default Credential Vulnerability ( CVE-2025-53758 )
This vulnerability exists in Digisol DG-GR6821AC Router due to use of default admin credentials at its web management interface. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the hardcoded default credentials stored in the firmware of the targeted device.
Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device.
Credit
These vulnerabilities are reported by Shravan Singh from Kavach IoT Security.
Solution
Upgrade Digisol DG-GR6821AC Router firmware to version HG323DACv5_all_V3.2.02-250509_Digisolver.
Vendor Information
Digisol Systems Limited
https://www.digisol.com/firmware/
References
Digisol Systems Limited
https://www.digisol.com/firmware/
CVE Name
CVE-2025-53754
CVE-2025-53755
CVE-2025-53756
CVE-2025-53757
CVE-2025-53758
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=T738
—–END PGP SIGNATURE—–