D-Link DCS series Wi-Fi cameras expose sensitive information regarding the device configuration. The affected devices include many of DCS series, such as: DCS-936L, DCS-942L, DCS-8000LH, DCS-942LB1, DCS-5222L, DCS-825L, DCS-2630L, DCS-820L, DCS-855L, DCS-2121, DCS-5222LB1, DCS-5020L, and many more. There are many affected firmware versions starting from 1.00 and above. The configuration file can be accessed remotely through: <Camera-IP>/common/info.cgi, with no authentication. The configuration file include the following fields: model, product, brand, version, build, hw_version, nipca version, device name, location, MAC address, IP address, gateway IP address, wireless status, input/output settings, speaker, and sensor settings.

Project Subscriptions

Vendors Products
Dcs-2102 Firmware Subscribe
Dcs-2121 Firmware Subscribe
Dcs-2630l Firmware Subscribe
Dcs-5222l Firmware Subscribe
Dcs-5222lb1 Firmware Subscribe
Dcs-8000lh Firmware Subscribe
Dcs-8100lh Firmware Subscribe
Dcs-820l Firmware Subscribe
Dcs-825l Firmware Subscribe
Dcs-855l Firmware Subscribe
Dcs-936l Firmware Subscribe
Dcs-942lb1 Firmware Subscribe
Dcs-2102 Subscribe
Dcs-2121 Subscribe
Dcs-2630l Subscribe
Dcs-5020l Subscribe
Dcs-5020l Firmware Subscribe
Dcs-5030l Subscribe
Dcs-5030l Firmware Subscribe
Dcs-5222l Subscribe
Dcs-5222lb1 Subscribe
Dcs-8000lh Subscribe
Dcs-8100lh Subscribe
Dcs-820l Subscribe
Dcs-825l Subscribe
Dcs-855l Subscribe
Dcs-930l Subscribe
Dcs-930l Firmware Subscribe
Dcs-932l Subscribe
Dcs-932l Firmware Subscribe
Dcs-933l Subscribe
Dcs-933l Firmware Subscribe
Dcs-936l Subscribe
Dcs-942l Subscribe
Dcs-942l Firmware Subscribe
Dcs-942lb1 Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2018-10169 D-Link DCS series Wi-Fi cameras expose sensitive information regarding the device configuration. The affected devices include many of DCS series, such as: DCS-936L, DCS-942L, DCS-8000LH, DCS-942LB1, DCS-5222L, DCS-825L, DCS-2630L, DCS-820L, DCS-855L, DCS-2121, DCS-5222LB1, DCS-5020L, and many more. There are many affected firmware versions starting from 1.00 and above. The configuration file can be accessed remotely through: <Camera-IP>/common/info.cgi, with no authentication. The configuration file include the following fields: model, product, brand, version, build, hw_version, nipca version, device name, location, MAC address, IP address, gateway IP address, wireless status, input/output settings, speaker, and sensor settings.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:08:21.874Z

Reserved: 2018-10-17T00:00:00

Link: CVE-2018-18441

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-12-20T23:29:00.707

Modified: 2024-11-21T03:55:56.640

Link: CVE-2018-18441

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses