Hardcoded Telnet Backdoor in D-Link DIR-605L Device
CVE-2026-42372

8.8HIGH

Key Information:

Vendor

D-link

Vendor
CVE Published:
4 May 2026

What is CVE-2026-42372?

The D-Link DIR-605L Hardware Revision A1 has a hardcoded telnet backdoor that poses significant security risks. When booted, the device initializes a telnet daemon using a predefined username 'Alphanetworks' and a static password, enabling an unauthenticated attacker on the local network to gain root shell access. This vulnerability is exacerbated by the fact that the device has reached End-of-Life (EOL) status and will not receive any patches or updates, leaving it particularly vulnerable to exploitation.

Affected Version(s)

DIR-605L Firmware MIPS32 Big-Endian A1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Arjun Basnet From Securin Labs
.