Hardcoded Telnet Backdoor Vulnerability in D-Link DIR-600L Router
CVE-2026-42374

9.8CRITICAL

Key Information:

Vendor

D-link

Vendor
CVE Published:
4 May 2026

What is CVE-2026-42374?

The D-Link DIR-600L Hardware Revision B1 is subject to significant security concerns due to a hardcoded telnet backdoor. The device initiates a telnet daemon on boot with default credentials, providing unauthorized access to attackers on the same local network. This vulnerability stems from the use of a static password, allowing attackers to gain root shell access and control over the device. As the product has reached End-of-Life (EOL), it will not receive any future patches, leaving it vulnerable to exploitation.

Affected Version(s)

DIR-600L Firmware MIPS32 Big-Endian B1

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Arjun Basnet from Securin Labs
.