{"vulnerability": "CVE-2026-42375", "sightings": [{"uuid": "bde78218-11c8-44d7-b717-9cf0e4d24c41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42375", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bcuhvhu2z", "content": "\ud83d\udd34 CVE-2026-42375 - Critical (9.8)\n\nD-Link DIR-600L Hardware Revision A1 (End-of-Life) contains a hardcoded telnet backdoor. The devi...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42375/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-04T18:08:36.058014Z"}, {"uuid": "17242068-f126-4f5b-a65e-10c88d757e52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42375", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116517327062901025", "content": "We have just added an important vulnerability affecting D-Link DIR-600L A1 (CVE-2026-42375) https://vuldb.com/vuln/360990", "creation_timestamp": "2026-05-04T16:48:36.323252Z"}, {"uuid": "22c6569d-3b2d-4cd6-8bb4-1bbc1f9a7007", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42375", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2cj7k7g62e", "content": "CVE-2026-42375 - D-Link DIR-600L A1 Hardcoded Telnet Backdoor Credentials\nCVE ID : CVE-2026-42375\n \n Published : May 4, 2026, 5:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : D-Link DIR-600L Hardware Revision A1 (End-of-Life) contains a hardcoded telnet backdoor. The device ...", "creation_timestamp": "2026-05-04T18:30:01.783667Z"}]}