4 results (0.005 seconds)

CVSS: 8.8EPSS: 0%CPEs: 20EXPL: 3

The D-Link DCS series of Wi-Fi cameras contains a stack-based buffer overflow in alphapd, the camera's web server. The overflow allows a remotely authenticated attacker to execute arbitrary code by providing a long string in the WEPEncryption parameter when requesting wireless.htm. Vulnerable devices include DCS-5009L (1.08.11 and below), DCS-5010L (1.14.09 and below), DCS-5020L (1.15.12 and below), DCS-5025L (1.03.07 and below), DCS-5030L (1.04.10 and below), DCS-930L (2.16.01 and below), DCS-931L (1.14.11 and below), DCS-932L (2.17.01 and below), DCS-933L (1.14.11 and below), and DCS-934L (1.05.04 and below). Las series DCS de D-Link de cámaras Wi-Fi contienen una vulnerabilidad de desbordamiento de búfer basado en pila en alphapd, el servidor web de la cámara. El desbordamiento permite a un atacante autenticado de forma remota ejecutar código arbitrario proporcionando una cadena larga en el parámetro WEPEncryption cuando solicita wireless.htm. • https://github.com/tacnetsol/CVE-2019-10999 https://github.com/qjh2333/CVE-2019-10999 https://github.com/fuzzywalls/CVE-2019-10999 https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10131 • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 62EXPL: 2

D-Link DCS cameras have a weak/insecure CrossDomain.XML file that allows sites hosting malicious Flash objects to access and/or change the device's settings via a CSRF attack. This is because of the 'allow-access-from domain' child element set to *, thus accepting requests from any domain. If a victim logged into the camera's web console visits a malicious site hosting a malicious Flash file from another Browser tab, the malicious Flash file then can send requests to the victim's DCS series Camera without knowing the credentials. An attacker can host a malicious Flash file that can retrieve Live Feeds or information from the victim's DCS series Camera, add new admin users, or make other changes to the device. Known affected devices are DCS-933L with firmware before 1.13.05, DCS-5030L, DCS-5020L, DCS-2530L, DCS-2630L, DCS-930L, DCS-932L, and DCS-932LB1. • https://www.exploit-db.com/exploits/42074 https://www.qualys.com/2017/02/22/qsa-2017-02-22/qsa-2017-02-22.pdf • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

Cross-site request forgery (CSRF) vulnerability in D-Link DCS-931L with firmware 1.04 and earlier allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. Vulnerabilidad de CSRF en D-Link DCS-931L con firmware 1.04 y anteriores permite a atacantes remotos secuestrar la autenticación de victimas no especificadas a través de vectores desconocidos. • http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10049 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.0EPSS: 63%CPEs: 2EXPL: 1

Unrestricted file upload vulnerability in D-Link DCS-931L with firmware 1.04 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension. Vulnerabilidad de la subida de ficheros sin restricciones en D-Link DCS-931L con firmware 1.04 y anteriores permite a usuarios remotos autenticados ejecutar código arbitrario mediante la subida de un fichero con una extensión ejecutable. • https://www.exploit-db.com/exploits/39192 http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10049 http://www.kb.cert.org/vuls/id/377348 •