CVE-2026-2054
Information Disclosure in D-Link DIR-605L/619L Wifi Handler
Publication date: 2026-02-06
Last updated on: 2026-02-17
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dlink | dir-605l_firmware | 2.06b01 |
| dlink | dir-619l_firmware | 2.13b01 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'This vulnerability affects D-Link DIR-605L and DIR-619L routers running firmware versions 2.06B01 and 2.13B01. It is caused by improper access controls and incorrect privilege assignments in the Wifi Setting Handler component. Specifically, an attacker can remotely access certain pages without authentication, such as "wifisc_ap_get_wpa_settings.asp" and "get_auto_wepkey.asp", which leads to unauthorized disclosure of sensitive Wi-Fi configuration information including WEP and WPA keys.'}, {'type': 'paragraph', 'content': 'The vulnerability allows remote attackers to gather sensitive information without any user interaction or privileges, making exploitation relatively easy. The affected products are no longer supported by the vendor, increasing the risk since no patches are available.'}] [1, 2]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': "This vulnerability can impact you by exposing your wireless network's security credentials, such as WEP and WPA keys, to unauthorized remote attackers. This compromises the confidentiality of your Wi-Fi settings and can lead to unauthorized access to your wireless network."}, {'type': 'paragraph', 'content': 'Since the attack requires no authentication and can be performed remotely with low complexity, attackers can easily exploit this flaw to gather sensitive information, potentially leading to further attacks on your network.'}, {'type': 'paragraph', 'content': 'Because the affected devices are no longer supported, there are no official patches, increasing the risk of exploitation.'}] [1, 2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking if your network contains D-Link DIR-605L or DIR-619L routers running firmware versions 2.06B01 or 2.13B01. Since the vulnerability allows unauthenticated remote access to specific pages exposing Wi-Fi configuration, you can attempt to access these pages to verify if the device is vulnerable.'}, {'type': 'list_item', 'content': "Use a web browser or command-line tool like curl to access the following URLs on the router's IP address without authentication:"}, {'type': 'list_item', 'content': 'http://[router_ip]/wifisc_ap_get_wpa_settings.asp'}, {'type': 'list_item', 'content': 'http://[router_ip]/get_auto_wepkey.asp'}, {'type': 'paragraph', 'content': 'If these pages return sensitive Wi-Fi configuration information such as WEP or WPA keys without requiring login, the device is vulnerable.'}] [1, 2]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'Since the affected devices are no longer supported by the vendor and no patches are available, immediate mitigation should focus on restricting access to the vulnerable components.'}, {'type': 'list_item', 'content': "Apply restrictive firewall rules to block remote access to the router's web interface from untrusted networks."}, {'type': 'list_item', 'content': 'Limit management access to the router to trusted internal networks only.'}, {'type': 'list_item', 'content': 'Consider replacing the affected routers with supported devices that receive security updates.'}] [2]