Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-28032 | Hardcoded credentials in the Telnet service in D-Link DIR-605L v2.13B01 and DIR-816L v2.06B01 allow attackers to remotely execute arbitrary commands via firmware analysis. |
Wed, 04 Jun 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink dir-605l Dlink dir-605l Firmware Dlink dir-816l Dlink dir-816l Firmware |
|
| CPEs | cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-816l:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-816l_firmware:2.06b01:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink dir-605l Dlink dir-605l Firmware Dlink dir-816l Dlink dir-816l Firmware |
Fri, 23 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Fri, 23 May 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hardcoded credentials in the Telnet service in D-Link DIR-605L v2.13B01 and DIR-816L v2.06B01 allow attackers to remotely execute arbitrary commands via firmware analysis. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-23T18:54:16.599Z
Reserved: 2025-04-22T00:00:00.000Z
Link: CVE-2025-46176
Updated: 2025-05-23T18:54:07.279Z
Status : Analyzed
Published: 2025-05-23T19:15:22.423
Modified: 2025-06-03T15:47:26.543
Link: CVE-2025-46176
No data.
OpenCVE Enrichment
No data.
EUVD