Hardcoded Telnet Backdoor in D-Link DIR-605L B2 Hardware Revision
CVE-2026-42373

9.8CRITICAL

Key Information:

Vendor

D-link

Vendor
CVE Published:
4 May 2026

What is CVE-2026-42373?

The D-Link DIR-605L B2 Hardware Revision contains a hardcoded telnet backdoor, allowing unauthorized access to full administrative control. Upon boot, the device initializes a telnet service with a static username and password, which are hardcoded into the firmware. This security flaw enables an attacker on the same local network to gain root shell access, posing significant risks to the network, especially since the D-Link DIR-605L has reached its End-of-Life and will not receive any security patches. Users are strongly advised to replace affected devices to safeguard their network.

Affected Version(s)

DIR-605L Firmware MIPS32 Big-Endian B2

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Arjun Basnet from Securin Labs
.