PatchSiren

PatchSiren cyber security CVE debrief

CVE-2011-4723 D-Link CVE debrief

CVE-2011-4723 is a D-Link DIR-300 router issue described as cleartext storage of a password. It is also listed in CISA’s Known Exploited Vulnerabilities catalog, which makes it a defensive priority even though the supplied corpus does not provide deeper technical detail. CISA’s guidance in the KEV entry says the impacted product is end-of-life and should be disconnected if still in use.

Vendor
D-Link
Product
DIR-300 Router
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2022-09-08
Original CVE updated
2022-09-08
Advisory published
2022-09-08
Advisory updated
2022-09-08

Who should care

Network and security teams, IT asset managers, and anyone still operating a D-Link DIR-300 router should pay attention. This is especially important for environments that may still have legacy or unmanaged home-office networking gear in service.

Technical summary

The supplied records identify the problem as cleartext storage of a password on the D-Link DIR-300 router. Because the product is end-of-life and included in CISA’s KEV catalog, the practical concern is that stored credentials may be exposed to anyone with sufficient access to the device or its storage, and the product should not be relied on for continued secure operation.

Defensive priority

High. KEV listing plus end-of-life status means this should be addressed urgently, with disconnect/removal prioritized over routine patch planning if the device is still deployed.

Recommended defensive actions

  • Inventory all D-Link DIR-300 devices and confirm whether any remain in service.
  • If the router is still in use, follow CISA’s guidance and disconnect it; plan replacement rather than continued operation.
  • Treat the device as high-risk legacy infrastructure and remove it from any sensitive network segment.
  • Review whether any credentials may have been stored on the device and rotate relevant passwords after decommissioning or replacement.
  • Use the official CVE and NVD records to track any additional vendor or advisory context before making operational changes.

Evidence notes

The supplied CISA KEV entry identifies the vulnerability as "D-Link DIR-300 Router Cleartext Storage of a Password Vulnerability," marks it as a known exploited vulnerability, and states: "The impacted product is end-of-life and should be disconnected if still in use." The provided corpus also includes official links to the CVE record and NVD detail page, but no additional technical specifics were included beyond the vulnerability name and KEV note.

Official resources

CISA KEV entry date in the supplied timeline is 2022-09-08, with a due date of 2022-09-29. The provided corpus does not include an original vendor disclosure date, so this debrief uses only the supplied CVE/KEV timeline fields for timing.