硬编码的Telnet凭据使D-Link路由器易受远程代码执行攻击
D-Link路由器存在安全漏洞(CVE-2025-46176),因固件中嵌入硬编码Telnet凭证导致远程代码执行风险。该漏洞影响DIR-605L和DIR-816L型号,CVSS评分为6.5(中等)。攻击者可利用默认凭证获取管理员权限并控制设备。由于设备已停更固件支持,建议禁用Telnet服务或更换设备以降低风险。 2025-5-26 13:57:47 Author: cybersecuritynews.com(查看原文) 阅读量:19 收藏

Hard-Coded Telnet Credentials D-Link Routers

A significant security flaw (CVE-2025-46176) has exposed thousands of D-Link routers to remote code execution attacks through hardcoded Telnet credentials embedded in firmware. 

The vulnerability affects DIR-605L v2.13B01 and DIR-816L v2.06B01 models, scoring 6.5 on the CVSS v3.1 scale with medium severity.

Security researchers discovered the flaw through firmware analysis, revealing that both router models contain default Telnet credentials that cannot be changed by users. 

Google News

The vulnerability allows unauthenticated attackers to bypass authentication and execute arbitrary commands remotely.

Hardcoded Telnet Credentials

Researchers utilized binwalk to extract firmware images, uncovering SquashFS file systems containing the vulnerable components. 

The analysis revealed that both affected models initialize Telnet services through ./bin/telnetd.sh scripts with hardcoded authentication.

The telnetd service launches with the command: /usr/sbin/telnetd -l /bin/sh -u Alphanetworks:$image_sign, where the $image_sign variable retrieves credentials from ./etc/alpha_config/image_sign. 

This configuration file contains plaintext passwords, including Wj5eH%JC for some devices.

Firmware analysis scripts identified the vulnerability using: grep -r “Alphanetworks” squashfs-root and cat squashfs-root/etc/alpha_config/image_sign. 

The discovery process involved searching for “Alphanetworks” references throughout the extracted filesystem, leading researchers to the telnetd initialization scripts.

Attackers can exploit this vulnerability by connecting directly to affected routers via Telnet using the discovered credentials. The attack vector requires only network access to the target device, with no authentication barriers once the hardcoded credentials are known.

The exploitation process involves: telnet 192.168.0[.]1 followed by entering Username: Alphanetworks and the corresponding password from the image_sign file. 

This grants attackers shell access with administrative privileges, enabling complete system compromise.

The vulnerability falls under CWE-77 (Improper Neutralization of Special Elements used in a Command), allowing command injection attacks. Security analysts can identify vulnerable services using: nmap -p 23 <target_IP> to detect exposed Telnet services.

With an EPSS score of 0.04%, active exploitation likelihood remains relatively low, though the persistent nature of hardcoded credentials creates ongoing risk. 

Successful exploitation enables attackers to modify router configurations, deploy malware, or pivot into internal networks.

Risk FactorsDetails
Affected ProductsD-Link DIR-605L (v2.13B01), DIR-816L (v2.06B01)
ImpactRemote code execution
Exploit PrerequisitesNetwork access to port 23/TCP; knowledge of hardcoded credentials
CVSS 3.1 Score6.5 (Medium)

Mitigations

D-Link acknowledged the vulnerability in their security bulletin, confirming that both affected models reached End-of-Life (EOL) status on November 17, 2023. 

The company stated that EOL products no longer receive firmware updates or security patches.

As of May 2025, no official patches exist for this vulnerability. D-Link recommends users disable Telnet services through administrative interfaces, restrict WAN access to management ports, and monitor for potential firmware updates.

Temporary mitigation strategies include blocking the Telnet port 23 through firewall rules and replacing affected devices with supported models. 

Security experts strongly recommend retiring these EOL devices due to the absence of security support and the impossibility of removing hardcoded credentials through configuration changes.

The vulnerability highlights the ongoing security risks associated with legacy networking equipment and embedded hardcoded credentials in IoT devices.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!


文章来源: https://cybersecuritynews.com/hard-coded-telnet-credentials-d-link-routers/
如有侵权请联系:admin#unsafe.sh