D-Link DCS series Wi-Fi cameras expose sensitive information regarding the device configuration. The affected devices include many of DCS series, such as: DCS-936L, DCS-942L, DCS-8000LH, DCS-942LB1, DCS-5222L, DCS-825L, DCS-2630L, DCS-820L, DCS-855L, DCS-2121, DCS-5222LB1, DCS-5020L, and many more. There are many affected firmware versions starting from 1.00 and above. The configuration file can be accessed remotely through: <Camera-IP>/common/info.cgi, with no authentication. The configuration file include the following fields: model, product, brand, version, build, hw_version, nipca version, device name, location, MAC address, IP address, gateway IP address, wireless status, input/output settings, speaker, and sensor settings.
Project Subscriptions
| Vendors | Products |
|---|---|
|
D-link
Subscribe
|
Dcs-2102 Firmware
Subscribe
Dcs-2121 Firmware
Subscribe
Dcs-2630l Firmware
Subscribe
Dcs-5222l Firmware
Subscribe
Dcs-5222lb1 Firmware
Subscribe
Dcs-8000lh Firmware
Subscribe
Dcs-8100lh Firmware
Subscribe
Dcs-820l Firmware
Subscribe
Dcs-825l Firmware
Subscribe
Dcs-855l Firmware
Subscribe
Dcs-936l Firmware
Subscribe
Dcs-942lb1 Firmware
Subscribe
|
|
Dlink
Subscribe
|
Dcs-2102
Subscribe
Dcs-2121
Subscribe
Dcs-2630l
Subscribe
Dcs-5020l
Subscribe
Dcs-5020l Firmware
Subscribe
Dcs-5030l
Subscribe
Dcs-5030l Firmware
Subscribe
Dcs-5222l
Subscribe
Dcs-5222lb1
Subscribe
Dcs-8000lh
Subscribe
Dcs-8100lh
Subscribe
Dcs-820l
Subscribe
Dcs-825l
Subscribe
Dcs-855l
Subscribe
Dcs-930l
Subscribe
Dcs-930l Firmware
Subscribe
Dcs-932l
Subscribe
Dcs-932l Firmware
Subscribe
Dcs-933l
Subscribe
Dcs-933l Firmware
Subscribe
Dcs-936l
Subscribe
Dcs-942l
Subscribe
Dcs-942l Firmware
Subscribe
Dcs-942lb1
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-10169 | D-Link DCS series Wi-Fi cameras expose sensitive information regarding the device configuration. The affected devices include many of DCS series, such as: DCS-936L, DCS-942L, DCS-8000LH, DCS-942LB1, DCS-5222L, DCS-825L, DCS-2630L, DCS-820L, DCS-855L, DCS-2121, DCS-5222LB1, DCS-5020L, and many more. There are many affected firmware versions starting from 1.00 and above. The configuration file can be accessed remotely through: <Camera-IP>/common/info.cgi, with no authentication. The configuration file include the following fields: model, product, brand, version, build, hw_version, nipca version, device name, location, MAC address, IP address, gateway IP address, wireless status, input/output settings, speaker, and sensor settings. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:08:21.874Z
Reserved: 2018-10-17T00:00:00
Link: CVE-2018-18441
No data.
Status : Modified
Published: 2018-12-20T23:29:00.707
Modified: 2024-11-21T03:55:56.640
Link: CVE-2018-18441
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD