ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·9/8/2022
CVE-2011-4723 added to CISA KEV: D-Link DIR-300 Router
Status: ✅ Confirmed exploited in the wild
Date added: 2022-09-08
Required action: The impacted product is end-of-life and should be disconnected if still in use.
Due date: 2022-09-29
Why this matters
The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information.
Sources
Lyrie Verdict
Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.