Impact
D-Link DIR‑605L and DIR‑619L routers running firmware versions 2.06B01 and 2.13B01 are vulnerable to an information disclosure when a crafted request is sent to the DHCP Client Information Handler. The weakness allows an attacker to obtain sensitive information from the device, potentially revealing configuration data or other internal details. The exposed data could be used to facilitate further attacks, such as password extraction or network mapping. This vulnerability is classified under CWE‑200 and CWE‑284, indicating confidentiality and access control weaknesses.
Affected Systems
The affected products are D‑Link DIR‑605L and DIR‑619L routers. Only the specific firmware versions 2.06B01 for the DIR‑605L and 2.13B01 for the DIR‑619L are impacted, and the devices are no longer supported by the manufacturer. Users running these models should check the exact firmware revision against those listed to confirm exposure.
Risk and Exploitability
The CVSS score of 6.9 reflects a moderate severity. The EPSS score is below 1 %, indicating a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, so it is not known to have been actively exploited. However, the ability for remote exploitation and the public availability of a proof‑of‑concept suggests that cautious action is warranted.
OpenCVE Enrichment