CVE-2026-42376
Awaiting Analysis Awaiting Analysis - Queue
Hardcoded Telnet Backdoor in D-Link DIR-456U

Publication date: 2026-05-04

Last updated on: 2026-05-04

Assigner: securin

Description
D-Link DIR-456U Hardware Revision A1 (End-of-Life, EOL) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /etc/init0.d/S80telnetd.sh with the username "Alphanetworks" and the static password "whdrv01_dlob_dir456U" read from /etc/config/image_sign. The custom telnetd binary accepts a -u user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control. The device has reached End-of-Life (EOL) and will not receive patches.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-04
Last Modified
2026-05-04
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
d-link dir-456u *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-798 The product contains hard-coded credentials, such as a password or cryptographic key.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The D-Link DIR-456U Hardware Revision A1 contains a hardcoded telnet backdoor. This means the device automatically starts a telnet service at boot with a fixed username "Alphanetworks" and a static password "whdrv01_dlob_dir456U". The telnet daemon uses a custom binary that accepts user credentials via a specific flag, and the login process validates these credentials using a simple string comparison. If an attacker on the local network uses these credentials, they can gain root shell access with full administrative control over the device.

Additionally, the device is End-of-Life (EOL), so it will not receive any security patches to fix this vulnerability.


How can this vulnerability impact me? :

This vulnerability allows an unauthenticated attacker on the local network to gain root-level access to the device. With full administrative control, the attacker can manipulate device settings, intercept or redirect network traffic, install malicious software, or use the device as a foothold to attack other devices on the network.

Because the device is no longer supported and will not receive patches, the risk remains unmitigated, increasing the likelihood of exploitation.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a hardcoded telnet backdoor on the D-Link DIR-456U Hardware Revision A1 device, which starts a telnet daemon at boot with a known username and password.

To detect this vulnerability on your network or system, you can scan for devices running a telnet service and attempt to connect using the hardcoded credentials.

  • Use a network scanning tool like nmap to identify devices with open telnet ports (port 23): nmap -p 23 --open <target-ip-range>
  • Attempt to connect to the telnet service using the hardcoded username and password: telnet <device-ip> and then login with username 'Alphanetworks' and password 'whdrv01_dlob_dir456U'.
  • Check for the presence of the telnet daemon startup script /etc/init0.d/S80telnetd.sh and the configuration file /etc/config/image_sign on the device if you have local access.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an unauthenticated attacker on the local network to gain root shell access with full administrative control due to a hardcoded telnet backdoor in the D-Link DIR-456U device. This level of unauthorized access can lead to compromise of sensitive data and systems.

Such unauthorized access and potential data breaches can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive information and mandate strict access controls.

Since the device is End-of-Life and will not receive patches, the risk remains unmitigated, further increasing the likelihood of non-compliance with these regulations.


What immediate steps should I take to mitigate this vulnerability?

Since the device is End-of-Life (EOL) and will not receive patches, immediate mitigation steps focus on limiting exposure and access.

  • Isolate the affected D-Link DIR-456U device from untrusted or public networks to prevent unauthorized local network access.
  • Disable the telnet service if possible, for example by removing or renaming the /etc/init0.d/S80telnetd.sh script to prevent the telnet daemon from starting at boot.
  • Replace the device with a supported model that receives security updates.
  • Monitor network traffic for suspicious telnet connections and unauthorized access attempts.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart