CVE-2026-2055: Information Disclosure in D-Link DIR-605L
A weakness has been identified in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The affected element is an unknown function of the component DHCP Client Information Handler. Executing a manipulation can lead to information disclosure. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2026-2055 identifies a medium-severity information disclosure vulnerability in D-Link DIR-605L and DIR-619L routers, specifically in firmware versions 2.06B01 and 2.13B01. The vulnerability resides in an unspecified function within the DHCP Client Information Handler component. An attacker can remotely manipulate this component without requiring authentication or user interaction, leading to unauthorized disclosure of sensitive information from the device. The disclosed information could include network configuration details or other data that may facilitate further attacks or reconnaissance. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting its network attack vector, low complexity, no privileges required, and no user interaction needed, but limited impact confined to confidentiality. The affected products are end-of-life and no longer receive security updates from D-Link, leaving users without official patches. Although no exploits have been observed in the wild, proof-of-concept code is publicly available, increasing the likelihood of exploitation attempts. The lack of vendor support and the public availability of exploits make this vulnerability particularly concerning for environments still using these legacy devices.
Potential Impact
The primary impact of CVE-2026-2055 is unauthorized disclosure of sensitive information from affected D-Link routers. This can compromise network confidentiality by exposing configuration details or other internal data, which attackers could leverage to conduct further attacks such as network mapping, targeted exploits, or lateral movement. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers can scan and target vulnerable devices at scale. Organizations relying on these outdated routers may face increased risk of network reconnaissance and subsequent compromise. The absence of vendor patches exacerbates the risk, as no official remediation is available. While the vulnerability does not directly affect integrity or availability, the information disclosure can be a critical enabler for more damaging attacks. This is especially significant for small businesses, home users, or organizations with limited network segmentation that continue to use these legacy devices.
Mitigation Recommendations
Given the lack of official patches due to end-of-life status, organizations should prioritize replacing affected D-Link DIR-605L and DIR-619L devices with currently supported models that receive regular security updates. If immediate replacement is not feasible, network administrators should isolate these routers from untrusted networks by placing them behind firewalls or restricting inbound access to trusted IP addresses only. Disabling unnecessary services, especially DHCP client features if configurable, may reduce the attack surface. Monitoring network traffic for unusual DHCP-related requests can help detect exploitation attempts. Employing network segmentation to separate vulnerable devices from critical infrastructure limits potential damage. Additionally, organizations should maintain an inventory of legacy devices and develop a plan for phased upgrades to supported hardware. Regularly reviewing and updating network device firmware and configurations is essential to minimize exposure to known vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, India, Brazil, Australia, Canada, France, Japan, South Korea
CVE-2026-2055: Information Disclosure in D-Link DIR-605L
Description
A weakness has been identified in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The affected element is an unknown function of the component DHCP Client Information Handler. Executing a manipulation can lead to information disclosure. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2055 identifies a medium-severity information disclosure vulnerability in D-Link DIR-605L and DIR-619L routers, specifically in firmware versions 2.06B01 and 2.13B01. The vulnerability resides in an unspecified function within the DHCP Client Information Handler component. An attacker can remotely manipulate this component without requiring authentication or user interaction, leading to unauthorized disclosure of sensitive information from the device. The disclosed information could include network configuration details or other data that may facilitate further attacks or reconnaissance. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting its network attack vector, low complexity, no privileges required, and no user interaction needed, but limited impact confined to confidentiality. The affected products are end-of-life and no longer receive security updates from D-Link, leaving users without official patches. Although no exploits have been observed in the wild, proof-of-concept code is publicly available, increasing the likelihood of exploitation attempts. The lack of vendor support and the public availability of exploits make this vulnerability particularly concerning for environments still using these legacy devices.
Potential Impact
The primary impact of CVE-2026-2055 is unauthorized disclosure of sensitive information from affected D-Link routers. This can compromise network confidentiality by exposing configuration details or other internal data, which attackers could leverage to conduct further attacks such as network mapping, targeted exploits, or lateral movement. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers can scan and target vulnerable devices at scale. Organizations relying on these outdated routers may face increased risk of network reconnaissance and subsequent compromise. The absence of vendor patches exacerbates the risk, as no official remediation is available. While the vulnerability does not directly affect integrity or availability, the information disclosure can be a critical enabler for more damaging attacks. This is especially significant for small businesses, home users, or organizations with limited network segmentation that continue to use these legacy devices.
Mitigation Recommendations
Given the lack of official patches due to end-of-life status, organizations should prioritize replacing affected D-Link DIR-605L and DIR-619L devices with currently supported models that receive regular security updates. If immediate replacement is not feasible, network administrators should isolate these routers from untrusted networks by placing them behind firewalls or restricting inbound access to trusted IP addresses only. Disabling unnecessary services, especially DHCP client features if configurable, may reduce the attack surface. Monitoring network traffic for unusual DHCP-related requests can help detect exploitation attempts. Employing network segmentation to separate vulnerable devices from critical infrastructure limits potential damage. Additionally, organizations should maintain an inventory of legacy devices and develop a plan for phased upgrades to supported hardware. Regularly reviewing and updating network device firmware and configurations is essential to minimize exposure to known vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-06T06:21:32.971Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6985e95cf9fa50a62f09632e
Added to database: 2/6/2026, 1:15:08 PM
Last enriched: 2/23/2026, 10:07:30 PM
Last updated: 3/22/2026, 10:52:26 PM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.