CVE-2026-2054
Unknown Unknown - Not Provided
Information Disclosure in D-Link DIR-605L/619L Wifi Handler

Publication date: 2026-02-06

Last updated on: 2026-02-17

Assigner: VulDB

Description
A security flaw has been discovered in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. Impacted is an unknown function of the component Wifi Setting Handler. Performing a manipulation results in information disclosure. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-06
Last Modified
2026-02-17
Generated
2026-05-07
AI Q&A
2026-02-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
dlink dir-605l_firmware 2.06b01
dlink dir-619l_firmware 2.13b01
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'This vulnerability affects D-Link DIR-605L and DIR-619L routers running firmware versions 2.06B01 and 2.13B01. It is caused by improper access controls and incorrect privilege assignments in the Wifi Setting Handler component. Specifically, an attacker can remotely access certain pages without authentication, such as "wifisc_ap_get_wpa_settings.asp" and "get_auto_wepkey.asp", which leads to unauthorized disclosure of sensitive Wi-Fi configuration information including WEP and WPA keys.'}, {'type': 'paragraph', 'content': 'The vulnerability allows remote attackers to gather sensitive information without any user interaction or privileges, making exploitation relatively easy. The affected products are no longer supported by the vendor, increasing the risk since no patches are available.'}] [1, 2]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability can impact you by exposing your wireless network's security credentials, such as WEP and WPA keys, to unauthorized remote attackers. This compromises the confidentiality of your Wi-Fi settings and can lead to unauthorized access to your wireless network."}, {'type': 'paragraph', 'content': 'Since the attack requires no authentication and can be performed remotely with low complexity, attackers can easily exploit this flaw to gather sensitive information, potentially leading to further attacks on your network.'}, {'type': 'paragraph', 'content': 'Because the affected devices are no longer supported, there are no official patches, increasing the risk of exploitation.'}] [1, 2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking if your network contains D-Link DIR-605L or DIR-619L routers running firmware versions 2.06B01 or 2.13B01. Since the vulnerability allows unauthenticated remote access to specific pages exposing Wi-Fi configuration, you can attempt to access these pages to verify if the device is vulnerable.'}, {'type': 'list_item', 'content': "Use a web browser or command-line tool like curl to access the following URLs on the router's IP address without authentication:"}, {'type': 'list_item', 'content': 'http://[router_ip]/wifisc_ap_get_wpa_settings.asp'}, {'type': 'list_item', 'content': 'http://[router_ip]/get_auto_wepkey.asp'}, {'type': 'paragraph', 'content': 'If these pages return sensitive Wi-Fi configuration information such as WEP or WPA keys without requiring login, the device is vulnerable.'}] [1, 2]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Since the affected devices are no longer supported by the vendor and no patches are available, immediate mitigation should focus on restricting access to the vulnerable components.'}, {'type': 'list_item', 'content': "Apply restrictive firewall rules to block remote access to the router's web interface from untrusted networks."}, {'type': 'list_item', 'content': 'Limit management access to the router to trusted internal networks only.'}, {'type': 'list_item', 'content': 'Consider replacing the affected routers with supported devices that receive security updates.'}] [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart