Vulnerability Description
Hardcoded credentials in the Telnet service in D-Link DIR-605L v2.13B01 and DIR-816L v2.06B01 allow attackers to remotely execute arbitrary commands via firmware analysis.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-605L Firmware | 2.13b01 |
| Dlink | Dir-605L | - |
| Dlink | Dir-816L Firmware | 2.06b01 |
| Dlink | Dir-816L | - |
Related Weaknesses (CWE)
References
- https://github.com/namberino/cve/tree/main/CVE-2025-46176Third Party Advisory
- https://www.dlink.com/en/security-bulletin/Issue Tracking
FAQ
What is CVE-2025-46176?
CVE-2025-46176 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Hardcoded credentials in the Telnet service in D-Link DIR-605L v2.13B01 and DIR-816L v2.06B01 allow attackers to remotely execute arbitrary commands via firmware analysis.
How severe is CVE-2025-46176?
CVE-2025-46176 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-46176?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-605L Firmware, Dlink Dir-605L, Dlink Dir-816L Firmware, Dlink Dir-816L.