Cyber Posture

CVE-2026-42373

CriticalPublic PoC

Published: 04 May 2026

Published
04 May 2026
Modified
06 May 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0015 34.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-42373 is a critical-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Dlink Dir-605L Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Remote Services (T1021); ranked at the 34.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Other AI Platforms.

The strongest mitigations our analysis identified are NIST 800-53 SA-22 (Unsupported System Components) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Remote Services (T1021) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Prohibits the use of unsupported end-of-life devices like the D-Link DIR-605L, preventing deployment or continued operation of systems with unpatchable hardcoded backdoors.

prevent

Requires identification, prioritization, and remediation of flaws such as this hardcoded telnet backdoor, necessitating replacement or isolation of the affected EOL router.

prevent

Enforces boundary protection to monitor and control communications at system boundaries, isolating the telnet service from untrusted local network access.

MITRE ATT&CK Enterprise TechniquesAI

T1021 Remote Services Lateral Movement
Adversaries may use [Valid Accounts](https://attack.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Hardcoded credentials enable direct authentication to the telnet remote service (T1021) using valid accounts (T1078) for initial root shell access on the device.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

D-Link DIR-605L Hardware Revision B2 (End-of-Life, EOL) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn76_dlwbr_dir605L" read from /etc/alpha_config/image_sign. The custom telnetd binary accepts a…

more

-u user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control. The device has reached End-of-Life (EOL) and will not receive patches.

Deeper analysisAI

CVE-2026-42373 is a hardcoded credential vulnerability (CWE-798) in the D-Link DIR-605L Hardware Revision B2 router, an end-of-life (EOL) device. The flaw involves a telnet backdoor daemon launched at boot via the /bin/telnetd.sh script, which configures the service with a static username of "Alphanetworks" and password "wrgn76_dlwbr_dir605L" sourced from /etc/alpha_config/image_sign. A custom telnetd binary accepts a -u user:password flag, while the custom login binary performs credential validation using strcmp(). The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

An unauthenticated attacker with access to the local network can exploit this by connecting to the telnet service using the hardcoded credentials, gaining a root shell with full administrative control over the device.

Advisories, including those published by Securin at https://www.securin.io/zero-day/cve-2026-42373-hardcoded-telnet-backdoor-in-d-link-dir-605l-b2-end-of-life-, confirm the device is EOL and will not receive patches from D-Link. Mitigation requires isolating affected devices from untrusted networks or decommissioning them entirely, as no firmware updates are available.

Details

CWE(s)

Affected Products

dlink
dir-605l firmware
all versions

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: backdoor

CVEs Like This One

CVE-2026-42372Same product: Dlink Dir-605L
CVE-2026-42374Same vendor: Dlink
CVE-2026-5981Same product: Dlink Dir-605L
CVE-2026-5979Same product: Dlink Dir-605L
CVE-2026-5983Same product: Dlink Dir-605L
CVE-2012-10021Same product: Dlink Dir-605L
CVE-2026-5982Same product: Dlink Dir-605L
CVE-2026-5980Same product: Dlink Dir-605L
CVE-2026-5984Same product: Dlink Dir-605L
CVE-2026-42375Same vendor: Dlink

References