vendor:
DCS-930L, DCS-932L
by:
Roberto Paleari
7,5
CVSS
HIGH
Authentication bypass, Remote command execution
287
CWE
Product Name: DCS-930L, DCS-932L
Affected Version From: 1.04
Affected Version To: 1.02
Patch Exists: YES
Related CWE: N/A
CPE: h:d-link:dcs-930l
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2012
Unauthenticated remote access to D-Link DCS cameras
D-Link DCS web cameras allow unauthenticated attackers to obtain the configuration of the device remotely. A copy of the device configuration can be obtained by accessing the following URL: http://<device IP address>/frame/GetConfig. The obtained configuration file is obfuscated using a trivial obfuscation scheme.
Mitigation:
Ensure that all web cameras are configured with strong passwords and that access to the web interface is restricted to trusted networks.