Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2055: Information Disclosure in D-Link DIR-605L

0
Medium
VulnerabilityCVE-2026-2055cvecve-2026-2055
Published: Fri Feb 06 2026 (02/06/2026, 13:02:08 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-605L

Description

A weakness has been identified in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The affected element is an unknown function of the component DHCP Client Information Handler. Executing a manipulation can lead to information disclosure. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:07:30 UTC

Technical Analysis

CVE-2026-2055 identifies a medium-severity information disclosure vulnerability in D-Link DIR-605L and DIR-619L routers, specifically in firmware versions 2.06B01 and 2.13B01. The vulnerability resides in an unspecified function within the DHCP Client Information Handler component. An attacker can remotely manipulate this component without requiring authentication or user interaction, leading to unauthorized disclosure of sensitive information from the device. The disclosed information could include network configuration details or other data that may facilitate further attacks or reconnaissance. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting its network attack vector, low complexity, no privileges required, and no user interaction needed, but limited impact confined to confidentiality. The affected products are end-of-life and no longer receive security updates from D-Link, leaving users without official patches. Although no exploits have been observed in the wild, proof-of-concept code is publicly available, increasing the likelihood of exploitation attempts. The lack of vendor support and the public availability of exploits make this vulnerability particularly concerning for environments still using these legacy devices.

Potential Impact

The primary impact of CVE-2026-2055 is unauthorized disclosure of sensitive information from affected D-Link routers. This can compromise network confidentiality by exposing configuration details or other internal data, which attackers could leverage to conduct further attacks such as network mapping, targeted exploits, or lateral movement. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers can scan and target vulnerable devices at scale. Organizations relying on these outdated routers may face increased risk of network reconnaissance and subsequent compromise. The absence of vendor patches exacerbates the risk, as no official remediation is available. While the vulnerability does not directly affect integrity or availability, the information disclosure can be a critical enabler for more damaging attacks. This is especially significant for small businesses, home users, or organizations with limited network segmentation that continue to use these legacy devices.

Mitigation Recommendations

Given the lack of official patches due to end-of-life status, organizations should prioritize replacing affected D-Link DIR-605L and DIR-619L devices with currently supported models that receive regular security updates. If immediate replacement is not feasible, network administrators should isolate these routers from untrusted networks by placing them behind firewalls or restricting inbound access to trusted IP addresses only. Disabling unnecessary services, especially DHCP client features if configurable, may reduce the attack surface. Monitoring network traffic for unusual DHCP-related requests can help detect exploitation attempts. Employing network segmentation to separate vulnerable devices from critical infrastructure limits potential damage. Additionally, organizations should maintain an inventory of legacy devices and develop a plan for phased upgrades to supported hardware. Regularly reviewing and updating network device firmware and configurations is essential to minimize exposure to known vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T06:21:32.971Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6985e95cf9fa50a62f09632e

Added to database: 2/6/2026, 1:15:08 PM

Last enriched: 2/23/2026, 10:07:30 PM

Last updated: 3/23/2026, 5:28:35 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses