CVE-2026-2056

A security vulnerability has been detected in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The impacted element is an unknown function of the file /wan_connection_status.asp of the component DHCP Connection Status Handler. The manipulation leads to information disclosure. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_82/82.md#poc--result Exploit Third Party Advisory
https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_83/83.md Third Party Advisory
https://vuldb.com/?ctiid.344616 Permissions Required VDB Entry
https://vuldb.com/?id.344616 Third Party Advisory VDB Entry
https://vuldb.com/?submit.744226 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-605l_firmware:2.06b01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:dlink:dir-619l_firmware:2.13b01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-619l:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-06 14:16

Updated : 2026-02-17 19:08


NVD link : CVE-2026-2056

Mitre link : CVE-2026-2056

CVE.ORG link : CVE-2026-2056


JSON object : View

Products Affected

dlink

  • dir-605l_firmware
  • dir-619l_firmware
  • dir-605l
  • dir-619l
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-284

Improper Access Control

NVD-CWE-noinfo