Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2056: Information Disclosure in D-Link DIR-605L

0
Medium
VulnerabilityCVE-2026-2056cvecve-2026-2056
Published: Fri Feb 06 2026 (02/06/2026, 14:02:09 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-605L

Description

A security vulnerability has been detected in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The impacted element is an unknown function of the file /wan_connection_status.asp of the component DHCP Connection Status Handler. The manipulation leads to information disclosure. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:07:43 UTC

Technical Analysis

CVE-2026-2056 is a medium severity information disclosure vulnerability identified in the D-Link DIR-605L and DIR-619L routers, specifically in firmware versions 2.06B01 and 2.13B01. The vulnerability resides in an unspecified function within the /wan_connection_status.asp file, part of the DHCP Connection Status Handler component. This flaw allows remote attackers to access sensitive information without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality but does not affect integrity or availability. The exploit is publicly disclosed, increasing the risk of exploitation, although no active exploitation has been reported. The affected products are no longer supported by D-Link, meaning no official patches or firmware updates are available to remediate the issue. The vulnerability could potentially expose network configuration details or other sensitive data that could facilitate further attacks or reconnaissance by adversaries. Given the lack of vendor support, mitigation options are limited to network-level controls or device replacement. The vulnerability's medium severity score of 6.9 reflects the balance between ease of exploitation and the limited impact scope, as it does not allow code execution or denial of service but still compromises sensitive information remotely.

Potential Impact

The primary impact of CVE-2026-2056 is unauthorized disclosure of sensitive information from affected D-Link routers. This information leakage can aid attackers in mapping network topology, identifying device configurations, or gathering credentials, which may facilitate subsequent attacks such as network intrusion, lateral movement, or targeted exploitation of other vulnerabilities. Since the vulnerability is remotely exploitable without authentication or user interaction, attackers can potentially scan and target vulnerable devices over the internet or internal networks. The lack of vendor support and patches increases the risk for organizations still operating these legacy devices, as they remain exposed indefinitely. While the vulnerability does not directly allow system compromise or denial of service, the information disclosed could be leveraged in multi-stage attacks, increasing overall risk. Organizations relying on these routers for critical network functions may face increased exposure to cyber espionage, data breaches, or disruption through follow-on attacks. The impact is particularly significant for environments where these devices are internet-facing or lack adequate network segmentation.

Mitigation Recommendations

Given the absence of vendor patches due to end-of-life status, organizations should prioritize replacing affected D-Link DIR-605L and DIR-619L routers with currently supported models that receive security updates. If immediate replacement is not feasible, network administrators should implement strict network segmentation to isolate vulnerable devices from untrusted networks, especially the internet. Employing firewall rules to restrict access to router management interfaces and the /wan_connection_status.asp endpoint can reduce exposure. Monitoring network traffic for unusual requests targeting these routers may help detect exploitation attempts. Additionally, disabling unnecessary services or features on the routers, if possible, can minimize attack surface. Organizations should also conduct asset inventories to identify all affected devices and assess their exposure. Finally, educating network staff about the risks of using unsupported hardware and the importance of timely device lifecycle management will help prevent similar risks in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T06:21:36.338Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6985f76df9fa50a62f0e885b

Added to database: 2/6/2026, 2:15:09 PM

Last enriched: 2/23/2026, 10:07:43 PM

Last updated: 3/23/2026, 6:56:28 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses