CVE-2026-42375
Published: 04 May 2026
Description
D-Link DIR-600L Hardware Revision A1 (End-of-Life) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn35_dlwbr_dir600l" read from /etc/alpha_config/image_sign. The custom telnetd binary accepts a -u…
more
user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control. The device has reached End-of-Life (EOL) and will not receive patches.
Mitigating Controls (NIST 800-53 r5)AI
Prohibits the use of end-of-life devices like the D-Link DIR-600L that contain unpatchable hardcoded backdoor credentials, preventing deployment or continued operation of vulnerable hardware.
Requires identification, prioritization, and remediation of the hardcoded telnet backdoor flaw (CVE-2026-42375) through replacement or retirement since no patches are available for the EOL device.
Monitors and controls communications at system boundaries to block local network access to the exposed telnet port (23), preventing exploitation of the hardcoded credentials backdoor.
Security SummaryAI
CVE-2026-42375 is a hardcoded credentials backdoor vulnerability (CWE-798) in the D-Link DIR-600L Hardware Revision A1 router, an end-of-life device. At boot, the firmware launches a telnet daemon via /bin/telnetd.sh, configuring it with the static username "Alphanetworks" and password "wrgn35_dlwbr_dir600l" sourced from /etc/alpha_config/image_sign. A custom telnetd binary accepts a -u user:password flag, while the custom login binary performs credential validation using strcmp(), enabling insecure remote access. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
An unauthenticated attacker on the local network can exploit this vulnerability by connecting to the telnet service with the known hardcoded credentials. Successful authentication provides a root shell, granting full administrative control over the device, including potential for arbitrary code execution, configuration changes, or persistence mechanisms.
Advisories, including those from Securin.io, confirm the device has reached end-of-life status and will not receive patches or vendor support. No mitigations are available beyond device replacement or network isolation to prevent local network access to the telnet port.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Matched keywords: backdoor
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hardcoded credentials in the Telnet daemon directly enable use of a backdoor/default account (T1078.001) for unauthenticated remote access via an external service (T1133), granting root shell on the network-accessible router.