Impact
A vulnerability in the DHCP Connection Status Handler of D‑Link DIR‑605L and DIR‑619L allows a remote attacker to manipulate the /wan_connection_status.asp page and obtain sensitive information disclosed by the device. The flaw can be exploited over the network, potentially exposing configuration details and device state and compromising confidentiality.
Affected Systems
The affected devices are the D‑Link DIR‑605L running firmware 2.06B01 and the D‑Link DIR‑619L running firmware 2.13B01. These models are no longer supported by the vendor and remain susceptible to the disclosed exploitation.
Risk and Exploitability
The vulnerability carries a CVSS score of 6.9, indicating medium severity. The EPSS score is below 1%, suggesting a low likelihood of widespread exploitation. It is not listed in the CISA KEV catalog. Attackers can trigger the information disclosure remotely by sending crafted requests to the /wan_connection_status.asp page, without requiring local access or additional credentials.
OpenCVE Enrichment