Impact
The firmware for the D-Link DIR-605L hardware revision A1 contains a telnet daemon that is started automatically at boot through a shell script. The daemon is started with a hardcoded username, "Alphanetworks", and a static password, "wrgn35_dlwbr_dir605l", stored in a configuration file. The custom login binary performs credential validation using a simple string comparison. If the attacker supplies the correct credentials, they are granted a root shell, giving them full administrative control over the device. This flaw corresponds to CWE-798, which pertains to hard‑coded secrets.
Affected Systems
The affected product is the D-Link DIR-605L A1 firmware, which has reached end‑of‑life and will not receive security updates. No other versions or variants are listed in the CNA data.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity. Because the vulnerability is exploited through a local network telnet service, an attacker only needs network access to the device; authentication is not required beyond using the hardcoded credentials. The EPSS metric is not provided, but the lack of a KEV listing suggests no widespread proof‑of‑concept exploitation has yet been observed. Nevertheless, the ability to obtain root privileges is a critical risk, especially for devices in production environments.
OpenCVE Enrichment