CVE-2017-8405
Summary
| CVE | CVE-2017-8405 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-07-02 20:15:00 UTC |
| Updated | 2021-04-23 18:50:00 UTC |
| Description | An issue was discovered on D-Link DCS-1130 and DCS-1100 devices. The binary rtspd in /sbin folder of the device handles all the rtsp connections received by the device. It seems that the binary loads at address 0x00012CF4 a flag called "Authenticate" that indicates whether a user should be authenticated or not before allowing access to the video feed. By default, the value for this flag is zero and can be set/unset using the HTTP interface and network settings tab as shown below. The device requires that a user logging to the HTTP management interface of the device to provide a valid username and password. However, the device does not enforce the same restriction by default on RTSP URL due to the checkbox unchecked by default, thereby allowing any attacker in possession of external IP address of the camera to view the live video feed. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there. |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | D-link | Dcs-1100 | - | All | All | All |
| Operating System | D-link | Dcs-1100 Firmware | - | All | All | All |
| Hardware | D-link | Dcs-1130 | - | All | All | All |
| Operating System | D-link | Dcs-1130 Firmware | - | All | All | All |
| Hardware | Dlink | Dcs-1100 | - | All | All | All |
| Hardware | Dlink | Dcs-1100 | - | All | All | All |
| Operating System | Dlink | Dcs-1100 Firmware | - | All | All | All |
| Operating System | Dlink | Dcs-1100 Firmware | - | All | All | All |
| Hardware | Dlink | Dcs-1130 | - | All | All | All |
| Hardware | Dlink | Dcs-1130 | - | All | All | All |
| Operating System | Dlink | Dcs-1130 Firmware | - | All | All | All |
| Operating System | Dlink | Dcs-1130 Firmware | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| IoT_vulnerabilities/Dlink_DCS_1130_security.pdf at master · ethanhunnt/IoT_vulnerabilities · GitHub | MISC | github.com | Exploit, Third Party Advisory |
| Dlink DCS-1130 Command Injection / CSRF / Stack Overflow ≈ Packet Storm | MISC | packetstormsecurity.com | Third Party Advisory, VDB Entry |
| Bugtraq: Newly releases IoT security issues | BUGTRAQ | seclists.org | Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.