D-Link DCS-825L devices with firmware 1.08 do not employ a suitable mechanism to prevent denial-of-service (DoS) attacks. An attacker can harm the device availability (i.e., live-online video/audio streaming) by using the hping3 tool to perform an IPv4 flood attack. Verified attacks includes SYN flooding, UDP flooding, ICMP flooding, and SYN-ACK flooding.
References
Link | Resource |
---|---|
https://dojo.bullguard.com/dojo-by-bullguard/blog/i-got-my-eyeon-you-security-vulnerabilities-in-baby-monitor/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-12-20T22:00:00
Updated: 2018-12-20T21:57:01
Reserved: 2018-10-17T00:00:00
Link: CVE-2018-18442
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-12-20T23:29:00.753
Modified: 2023-04-26T18:55:30.893
Link: CVE-2018-18442
JSON object: View
Redhat Information
No data.
CWE