CVE-2026-42373
- EPSS 0.15%
- Veröffentlicht 04.05.2026 15:57:31
- Zuletzt bearbeitet 06.05.2026 12:19:20
D-Link DIR-605L Hardware Revision B2 (End-of-Life, EOL) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn76_dlwbr_dir605L" read from /et...
CVE-2026-42372
- EPSS 0.05%
- Veröffentlicht 04.05.2026 15:53:30
- Zuletzt bearbeitet 06.05.2026 12:20:47
D-Link DIR-605L Hardware Revision A1 (End-of-Life, EOL) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn35_dlwbr_dir605l" read from /et...
CVE-2018-20056
- EPSS 46.44%
- Veröffentlicht 11.12.2018 09:29:00
- Zuletzt bearbeitet 21.11.2024 04:00:48
An issue was discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. There is a stack-based buffer overflow allowing remote attackers to execute arbitrary code without authentication via the goform/formLanguageChange...
- EPSS 9.44%
- Veröffentlicht 11.12.2018 09:29:00
- Zuletzt bearbeitet 21.11.2024 04:00:49
An issue was discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. goform/formSysCmd allows remote authenticated users to execute arbitrary OS commands via the sysCmd POST parameter.