5
CVSSv2

CVE-2018-18441

Published: 20/12/2018 Updated: 26/04/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

D-Link DCS series Wi-Fi cameras expose sensitive information regarding the device configuration. The affected devices include many of DCS series, such as: DCS-936L, DCS-942L, DCS-8000LH, DCS-942LB1, DCS-5222L, DCS-825L, DCS-2630L, DCS-820L, DCS-855L, DCS-2121, DCS-5222LB1, DCS-5020L, and many more. There are many affected firmware versions starting from 1.00 and above. The configuration file can be accessed remotely through: <Camera-IP>/common/info.cgi, with no authentication. The configuration file include the following fields: model, product, brand, version, build, hw_version, nipca version, device name, location, MAC address, IP address, gateway IP address, wireless status, input/output settings, speaker, and sensor settings.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

d-link dcs-936l_firmware

dlink dcs-942l_firmware

d-link dcs-8000lh_firmware

d-link dcs-942lb1_firmware

d-link dcs-5222l_firmware

d-link dcs-825l_firmware

d-link dcs-2630l_firmware

d-link dcs-820l_firmware

d-link dcs-855l_firmware

d-link dcs-2121_firmware

d-link dcs-5222lb1_firmware

dlink dcs-5020l_firmware

dlink dcs-930l_firmware

d-link dcs-8100lh_firmware

dlink dcs-932l_firmware

d-link dcs-2102_firmware

dlink dcs-933l_firmware

dlink dcs-5030l_firmware