Configuration File Disclosure Vulnerability in D-Link DSL-124 by D-Link
CVE-2023-53974

8.8HIGH

Key Information:

Vendor

D-link

Vendor
CVE Published:
22 December 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2023-53974?

The D-Link DSL-124 ME_1.00 is susceptible to a configuration file disclosure vulnerability, enabling unauthenticated attackers to obtain sensitive router settings. By sending a specific POST request to the configuration endpoint, attackers can download a complete backup file revealing network credentials and system configurations, thus compromising the security of the affected device.

Affected Version(s)

DSL-124 Wireless N300 ADSL2+ ME_1.00

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Aryan Chehreghani
.
CVE-2023-53974 : Configuration File Disclosure Vulnerability in D-Link DSL-124 by D-Link