An issue was discovered on D-Link DCS-1130 devices. The device requires that a user logging to the device to provide a username and password. However, the device does not enforce the same restriction on a specific URL thereby allowing any attacker in possession of that to view the live video feed. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSRF-Stack-Overflow.html | Third Party Advisory VDB Entry |
https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Dlink_DCS_1130_security.pdf | Exploit Third Party Advisory |
https://seclists.org/bugtraq/2019/Jun/8 | Mailing List Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-02T19:09:08
Updated: 2019-07-02T19:10:44
Reserved: 2017-05-02T00:00:00
Link: CVE-2017-8409
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-02T20:15:11.043
Modified: 2021-04-23T18:51:06.427
Link: CVE-2017-8409
JSON object: View
Redhat Information
No data.
CWE