CVE-2026-2055
Unknown Unknown - Not Provided
Information Disclosure via DHCP Client Handler in D-Link Routers

Publication date: 2026-02-06

Last updated on: 2026-02-17

Assigner: VulDB

Description
A weakness has been identified in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The affected element is an unknown function of the component DHCP Client Information Handler. Executing a manipulation can lead to information disclosure. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-06
Last Modified
2026-02-17
Generated
2026-05-07
AI Q&A
2026-02-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
dlink dir-605l_firmware 2.06b01
dlink dir-619l_firmware 2.13b01
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-2055 is an information disclosure vulnerability affecting D-Link DIR-605L and DIR-619L routers running firmware versions 2.06B01 and 2.13B01.

The flaw exists in an unknown function within the DHCP Client Information Handler component, where manipulation with unspecified input leads to unauthorized disclosure of sensitive information.

Specifically, improper access controls and incorrect privilege assignments allow an attacker to access certain router web interface pages (dhcp_clients.asp, dyn_clients_only.asp, wifi_assoc.asp) without any authentication.

This unauthorized access exposes sensitive network information, including DHCP client details and Wi-Fi client data.

The vulnerability can be exploited remotely without authentication, and a public proof-of-concept exploit is available.

The affected products are no longer supported by the vendor.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive network information, such as DHCP client details and Wi-Fi client associations.

An attacker can remotely access this information without any authentication, potentially gaining insights into your network configuration and connected devices.

Such information disclosure can be used to facilitate further attacks or reconnaissance against your network.

Since the affected devices are no longer supported, no official patches are available, increasing the risk if the devices remain in use.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability can be detected by checking if your network devices are D-Link DIR-605L or DIR-619L routers running firmware versions 2.06B01 or 2.13B01. Since the vulnerability allows unauthorized access to specific router web interface pages without authentication, you can attempt to access the following URLs on the router's web interface to verify exposure: dhcp_clients.asp, dyn_clients_only.asp, and wifi_assoc.asp."}, {'type': 'paragraph', 'content': 'To detect exploitation attempts or verify vulnerability, you can use network scanning or HTTP request commands such as:'}, {'type': 'list_item', 'content': 'curl -I http://[router_ip]/dhcp_clients.asp'}, {'type': 'list_item', 'content': 'curl -I http://[router_ip]/dyn_clients_only.asp'}, {'type': 'list_item', 'content': 'curl -I http://[router_ip]/wifi_assoc.asp'}, {'type': 'paragraph', 'content': 'If these pages respond without requiring authentication, the device is vulnerable. Additionally, monitoring network traffic for unauthorized access to these pages can help detect exploitation attempts.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Since the affected D-Link DIR-605L and DIR-619L devices are no longer supported by the vendor, no firmware patches are available. Immediate mitigation involves restricting access to the vulnerable devices.'}, {'type': 'list_item', 'content': "Implement strict firewall rules to block remote access to the router's web interface, especially blocking access to the vulnerable pages (dhcp_clients.asp, dyn_clients_only.asp, wifi_assoc.asp) from untrusted networks."}, {'type': 'list_item', 'content': 'Limit management access to the router to trusted internal networks only.'}, {'type': 'list_item', 'content': 'If possible, replace the affected devices with supported hardware that receives security updates.'}] [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart