{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2056","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-06T06:21:36.338Z","datePublished":"2026-02-06T14:02:09.758Z","dateUpdated":"2026-02-23T09:25:37.513Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:25:37.513Z"},"title":"D-Link DIR-605L/DIR-619L DHCP Connection Status wan_connection_status.asp information disclosure","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-200","lang":"en","description":"Information Disclosure"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"D-Link","product":"DIR-605L","versions":[{"version":"2.06B01","status":"affected"},{"version":"2.13B01","status":"affected"}],"modules":["DHCP Connection Status Handler"]},{"vendor":"D-Link","product":"DIR-619L","versions":[{"version":"2.06B01","status":"affected"},{"version":"2.13B01","status":"affected"}],"modules":["DHCP Connection Status Handler"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The impacted element is an unknown function of the file /wan_connection_status.asp of the component DHCP Connection Status Handler. The manipulation leads to information disclosure. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:UR"}}],"timeline":[{"time":"2026-02-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-18T01:03:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"pjqwudi (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.344616","name":"VDB-344616 | D-Link DIR-605L/DIR-619L DHCP Connection Status wan_connection_status.asp information disclosure","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.344616","name":"VDB-344616 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.744226","name":"Submit #744226 | D-Link DIR619L、DIR605L 2.06B01、2.13B01 Improper Access Controls","tags":["third-party-advisory"]},{"url":"https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_83/83.md","tags":["related"]},{"url":"https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_82/82.md#poc--result","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-06T16:47:55.806942Z","id":"CVE-2026-2056","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-06T16:48:10.195Z"}}]}}