Impact
The D-Link DIR‑605L router starts a telnet daemon at boot, using hard‑coded credentials stored in /etc/alpha_config/image_sign. The custom login binary validates the username and password via a simple strcmp call, giving an unauthenticated attacker on the local network a root shell and full administrative control, effectively allowing remote code execution.
Affected Systems
This flaw affects all D‑Link DIR‑605L devices running the firmware revision B2. The product is currently End‑of‑Life and will no longer receive security updates from D‑Link.
Risk and Exploitability
The CVSS score of 9.8 indicates a critical risk. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is local network access via telnet on port 23. Because any local host can connect without prior authentication and the backdoor accepts a predefined username and password, exploitation is straightforward and highly probable if the device remains on the network.
OpenCVE Enrichment