Impact
An unknown function in the Wi‑Fi Setting Handler of D‑Link DIR‑605L and DIR‑619L firmware exposes sensitive information when manipulated. The vulnerability permits the retrieval of configuration or other data that should remain confidential. The description does not specify whether credentials or administrative settings are among the leaked data, so any such exposure is not confirmed in the CVE text.
Affected Systems
Products affected are the D‑Link DIR‑605L and DIR‑619L routers running firmware versions 2.06B01 and 2.13B01 respectively. These specific models and firmware builds are documented as no longer supported by the manufacturer, meaning no official patches are available from D‑Link.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate to high impact, but the EPSS score is less than 1 %, implying that real‑world exploitation is rare at present. The vulnerability is not listed in the CISA KEV catalog, yet it can be leveraged if an attacker can remotely access the router’s management interface and submit crafted requests that trigger the disclosure. Because the exploit is publicly available, the risk to organizations that still use the affected devices increases if they have not applied mitigations.
OpenCVE Enrichment