D-Link Routers Exposed by Hard-Coded Telnet Credentials

D-Link Routers Exposed by Hard-Coded Telnet Credentials

A newly disclosed vulnerability (CVE-2025-46176) affects D-Link DIR-605L and DIR-816L routers, enabling remote attackers to exploit hardcoded Telnet credentials for command execution. Although exploitation likelihood is low, the lack of firmware patches poses ongoing security risks. #CVE-2025-46176 #DLinkDIR605L #DLinkDIR816L #TelnetVulnerabilities

Keypoints

  • The vulnerability impacts firmware versions 2.13B01 for DIR-605L and 2.06B01 for DIR-816L, scoring 6.5 on CVSS v3.1.
  • Security flaws stem from improper command neutralization, allowing authentication bypass during firmware analysis.
  • Hardcoded credentials are stored in firmware, enabling unauthorized Telnet access with plaintext passwords like Wj5eH%JC.
  • Potential risks include remote command execution, router configuration modifications, and malware deployment.
  • While no official patches are available, users are advised to disable Telnet and restrict WAN access until firmware updates are issued.

Read More: https://gbhackers.com/d-link-exposed-hard-coded/