A newly disclosed vulnerability (CVE-2025-46176) affects D-Link DIR-605L and DIR-816L routers, enabling remote attackers to exploit hardcoded Telnet credentials for command execution. Although exploitation likelihood is low, the lack of firmware patches poses ongoing security risks. #CVE-2025-46176 #DLinkDIR605L #DLinkDIR816L #TelnetVulnerabilities
Keypoints
- The vulnerability impacts firmware versions 2.13B01 for DIR-605L and 2.06B01 for DIR-816L, scoring 6.5 on CVSS v3.1.
- Security flaws stem from improper command neutralization, allowing authentication bypass during firmware analysis.
- Hardcoded credentials are stored in firmware, enabling unauthorized Telnet access with plaintext passwords like Wj5eH%JC.
- Potential risks include remote command execution, router configuration modifications, and malware deployment.
- While no official patches are available, users are advised to disable Telnet and restrict WAN access until firmware updates are issued.