- Description
- Hardcoded credentials in the Telnet service in D-Link DIR-605L v2.13B01 and DIR-816L v2.06B01 allow attackers to remotely execute arbitrary commands via firmware analysis.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 6.5
- Impact score
- 2.5
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
- Severity
- MEDIUM
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-77
- Hype score
- Not currently trending
D-Link Router の脆弱性 CVE-2025-46176:ハードコードされた Telnet 認証情報 https://t.co/iCpo3x7efB D-Link DIR-605L/DIR-816L に RCE 脆弱性とのことですが、現時点ではパッチが存在しないとのことです。当該製品をご利用のチ
@iototsecnews
6 Jun 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Trending CVEs on 29/5/25: CVE-2021-43883 / Microsoft Windows / Privilege Escalation CVE-2023-38879 / openSIS / Path Traversal CVE-2024-51211 / openSIS / SQL Injection CVE-2025-46176 / D-Link / Hardcoded Credentials Learn More: https://t.co/qa9eXdXTMN #EarlyWarning #Infosec http
@arpsyndicate
29 May 2025
96 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
به تازگی برای مودم های Dlink مدل DIR-605L و DIR-816L آسیب پذیری با کد شناسایی (CVE-2025-46176) برای سرویس telnet و user و پسورد hardcode شده در این مدل روتر ها منتشر شده است. این آسیب
@AmirHossein_sec
27 May 2025
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A new vulnerability (CVE-2025-46176) affects D-Link DIR-605L & DIR-816L routers, exposing hardcoded Telnet credentials that allow remote command execution. Firmware patches are still pending. 🛑 #DLink #TelnetRisk #UK https://t.co/1qCyn0LwcQ
@TweetThreatNews
27 May 2025
39 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
A new vulnerability (CVE-2025-46176) affects D-Link DIR-605L & DIR-816L routers with firmware versions 2.13B01 & 2.06B01. Hardcoded Telnet credentials allow remote command execution. Firmware patches missing. 🔒 #RouterSecurity #TelnetFlaw https://t.co/1qCyn0LwcQ
@TweetThreatNews
27 May 2025
50 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
【CVE-2025-46176】D-Link製ルータに深刻な脆弱性、ハードコードされたTelnet認証情報により任意コマンド実行が可能 – いまだ公式修正パッチは未提供 https://t.co/RD3sQGqAOm @nikkeimatomeより
@nikkeimatome
26 May 2025
61 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-46176 Hardcoded credentials in the Telnet service in D-Link DIR-605L v2.13B01 and DIR-816L v2.06B01 allow attackers to remotely execute arbitrary commands via firmware anal… https://t.co/5K7AMxqvbq
@CVEnew
24 May 2025
446 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "47A17995-9117-42E4-938E-D18F605DD0FE"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "CD4E3AA2-EC1C-4219-8E13-B52D30A7FA06"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-816l_firmware:2.06b01:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "09BC0D3D-3C20-45EF-A753-04F2AC5010AA"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-816l:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A17C1E74-E315-4292-AF6B-EEF86B64A63C"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]