Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2056: Information Disclosure in D-Link DIR-605L

0
Medium
VulnerabilityCVE-2026-2056cvecve-2026-2056
Published: Fri Feb 06 2026 (02/06/2026, 14:02:09 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-605L

Description

CVE-2026-2056 is an information disclosure vulnerability affecting D-Link DIR-605L and DIR-619L routers running firmware versions 2. 06B01 and 2. 13B01. The flaw exists in the DHCP Connection Status Handler component, specifically in the /wan_connection_status. asp file, allowing remote attackers to access sensitive information without authentication or user interaction. Although the vulnerability has a medium severity score of 6. 9 and the exploit code is publicly available, the affected devices are no longer supported by the vendor, meaning no official patches exist. This increases the risk for organizations still using these legacy devices. The vulnerability does not impact system integrity or availability but can expose network configuration details that may aid further attacks. European organizations using these D-Link models should consider device replacement or network segmentation to mitigate risk.

AI-Powered Analysis

AILast updated: 02/06/2026, 14:29:28 UTC

Technical Analysis

CVE-2026-2056 is a medium-severity information disclosure vulnerability identified in D-Link DIR-605L and DIR-619L routers running firmware versions 2.06B01 and 2.13B01. The vulnerability resides in an unspecified function within the /wan_connection_status.asp file, part of the DHCP Connection Status Handler component. This flaw allows remote attackers to retrieve sensitive information from the device without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality by exposing potentially sensitive network status information, which could be leveraged to facilitate further attacks such as network reconnaissance or targeted exploitation. The affected devices are no longer supported by D-Link, and no official patches or updates are available, increasing the risk for users who continue to operate these routers. Although no known exploits are currently observed in the wild, the public disclosure of exploit code raises the likelihood of exploitation attempts. The vulnerability does not affect the integrity or availability of the device, limiting the scope of impact to information disclosure only. The CVSS 4.0 score of 6.9 reflects the ease of remote exploitation and the potential value of the disclosed information. Given the widespread use of D-Link routers in consumer and small business environments, this vulnerability poses a risk primarily to organizations and individuals relying on legacy hardware without vendor support.

Potential Impact

For European organizations, the primary impact of CVE-2026-2056 is the unauthorized disclosure of network configuration and status information from vulnerable D-Link routers. This information can aid attackers in mapping internal networks, identifying further vulnerabilities, or crafting targeted attacks such as man-in-the-middle or session hijacking. Although the vulnerability does not directly compromise device integrity or availability, the exposure of sensitive network details can undermine overall security posture. Organizations using these legacy devices in critical network segments or as part of their perimeter defenses face increased risk of reconnaissance and subsequent exploitation. The lack of vendor support and patches means that affected organizations cannot remediate the vulnerability through firmware updates, necessitating alternative mitigation strategies. This is particularly concerning for sectors with strict data protection requirements under GDPR, as information disclosure could lead to compliance issues. Additionally, small and medium enterprises (SMEs) and home office setups that rely on these routers may be vulnerable entry points for attackers targeting larger corporate networks.

Mitigation Recommendations

Given the absence of official patches for this vulnerability, European organizations should prioritize replacing affected D-Link DIR-605L and DIR-619L routers with supported, updated hardware to eliminate the risk. If immediate replacement is not feasible, organizations should implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data environments. Employing strict firewall rules to restrict remote access to router management interfaces and disabling WAN-side access to administrative pages can reduce exposure. Monitoring network traffic for unusual access attempts to the /wan_connection_status.asp endpoint or other router management URLs can help detect exploitation attempts. Organizations should also consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation patterns related to this vulnerability. Regular network audits to identify legacy devices and maintain an updated asset inventory will aid in proactive risk management. Finally, educating users about the risks of unsupported hardware and encouraging timely hardware lifecycle management will help prevent similar vulnerabilities from persisting.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T06:21:36.338Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6985f76df9fa50a62f0e885b

Added to database: 2/6/2026, 2:15:09 PM

Last enriched: 2/6/2026, 2:29:28 PM

Last updated: 2/6/2026, 3:17:33 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats