CVE-2018-18441
https://notcve.org/view.php?id=CVE-2018-18441
D-Link DCS series Wi-Fi cameras expose sensitive information regarding the device configuration. The affected devices include many of DCS series, such as: DCS-936L, DCS-942L, DCS-8000LH, DCS-942LB1, DCS-5222L, DCS-825L, DCS-2630L, DCS-820L, DCS-855L, DCS-2121, DCS-5222LB1, DCS-5020L, and many more. There are many affected firmware versions starting from 1.00 and above. The configuration file can be accessed remotely through: <Camera-IP>/common/info.cgi, with no authentication. The configuration file include the following fields: model, product, brand, version, build, hw_version, nipca version, device name, location, MAC address, IP address, gateway IP address, wireless status, input/output settings, speaker, and sensor settings. • https://dojo.bullguard.com/dojo-by-bullguard/blog/i-got-my-eyeon-you-security-vulnerabilities-in-baby-monitor • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2017-7851 – D-Link DCS-936L Network Camera - Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2017-7851
D-Link DCS-936L devices with firmware before 1.05.07 have an inadequate CSRF protection mechanism that requires the device's IP address to be a substring of the HTTP Referer header. Los dispositivos D-Link DCS-936L con firmware en versiones anteriores a la 1.05.07 tienen un mecanismo de protección CSRF inadecuado que requiere que la dirección IP del dispositivo sea una subcadena de la cabecera HTTP Referer. D-Link DCS-936L suffers from a cross site request forgery vulnerability. • https://www.exploit-db.com/exploits/43146 ftp://ftp2.dlink.com/PRODUCTS/DCS-936L/REVA/BETA/DCS-936L_REVA_RELEASE_NOTES_v1.05.07_EN.pdf https://www.qualys.com/2017/03/26/qsa-2017-03-26/qsa-2017-03-26.pdf • CWE-352: Cross-Site Request Forgery (CSRF) •