D-Link DCS cameras have a weak/insecure CrossDomain.XML file that allows sites hosting malicious Flash objects to access and/or change the device's settings via a CSRF attack. This is because of the 'allow-access-from domain' child element set to *, thus accepting requests from any domain. If a victim logged into the camera's web console visits a malicious site hosting a malicious Flash file from another Browser tab, the malicious Flash file then can send requests to the victim's DCS series Camera without knowing the credentials. An attacker can host a malicious Flash file that can retrieve Live Feeds or information from the victim's DCS series Camera, add new admin users, or make other changes to the device. Known affected devices are DCS-933L with firmware before 1.13.05, DCS-5030L, DCS-5020L, DCS-2530L, DCS-2630L, DCS-930L, DCS-932L, and DCS-932LB1.

Project Subscriptions

Vendors Products
Dcs-2132l Subscribe
Dcs-2132l Firmware Subscribe
Dcs-2136l Subscribe
Dcs-2136l Firmware Subscribe
Dcs-2210l Subscribe
Dcs-2210l Firmware Subscribe
Dcs-2230l Subscribe
Dcs-2230l Firmware Subscribe
Dcs-2310l Subscribe
Dcs-2310l Firmware Subscribe
Dcs-2330l Subscribe
Dcs-2330l Firmware Subscribe
Dcs-2332l Subscribe
Dcs-2332l Firmware Subscribe
Dcs-2530l Subscribe
Dcs-2530l Firmware Subscribe
Dcs-5000l Subscribe
Dcs-5000l Firmware Subscribe
Dcs-5009l Subscribe
Dcs-5009l Firmware Subscribe
Dcs-5010l Subscribe
Dcs-5010l Firmware Subscribe
Dcs-5020l Subscribe
Dcs-5020l Firmware Subscribe
Dcs-5025l Subscribe
Dcs-5025l Firmware Subscribe
Dcs-5029l Subscribe
Dcs-5029l Firmware Subscribe
Dcs-5030l Subscribe
Dcs-5030l Firmware Subscribe
Dcs-5222l Subscribe
Dcs-5222l Firmware Subscribe
Dcs-6010l Subscribe
Dcs-6010l Firmware Subscribe
Dcs-6212l Subscribe
Dcs-6212l Firmware Subscribe
Dcs-7000l Subscribe
Dcs-7000l Firmware Subscribe
Dcs-7010l Subscribe
Dcs-7010l Firmware Subscribe
Dcs-930l Subscribe
Dcs-930l Firmware Subscribe
Dcs-931l Subscribe
Dcs-931l Firmware Subscribe
Dcs-932l Subscribe
Dcs-932l Firmware Subscribe
Dcs-933l Subscribe
Dcs-933l Firmware Subscribe
Dcs-934l Subscribe
Dcs-934l Firmware Subscribe
Dcs-942l Subscribe
Dcs-942l Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2017-16827 D-Link DCS cameras have a weak/insecure CrossDomain.XML file that allows sites hosting malicious Flash objects to access and/or change the device's settings via a CSRF attack. This is because of the 'allow-access-from domain' child element set to *, thus accepting requests from any domain. If a victim logged into the camera's web console visits a malicious site hosting a malicious Flash file from another Browser tab, the malicious Flash file then can send requests to the victim's DCS series Camera without knowing the credentials. An attacker can host a malicious Flash file that can retrieve Live Feeds or information from the victim's DCS series Camera, add new admin users, or make other changes to the device. Known affected devices are DCS-933L with firmware before 1.13.05, DCS-5030L, DCS-5020L, DCS-2530L, DCS-2630L, DCS-930L, DCS-932L, and DCS-932LB1.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T16:19:28.376Z

Reserved: 2017-04-13T00:00:00

Link: CVE-2017-7852

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-04-24T10:59:00.160

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-7852

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses