ID
VAR-201110-0510
TITLE
D-Link DCS-2121 Password Field Remote Command Injection Vulnerability
Trust: 0.6
DESCRIPTION
The D-Link DCS-2121 is a network camera device. The D-Link DCS-2121 is based on the Linux embedded system. If the password field data is not properly filtered, the shell metacharacter (semicolon injection) can be injected and any command can be executed. D-Link DCS-2121 is prone to a remote command-execution vulnerability. Attackers can exploit this issue to execute arbitrary commands within the context of the affected device. D-Link DCS-2121 with firmware version 1.04 is vulnerable; other versions may also be affected
Trust: 0.81
IOT TAXONOMY
category: | ['IoT', 'Network device'] | sub_category: | - | Trust: 0.6 |
AFFECTED PRODUCTS
vendor: | d link | model: | dcs-2121 | scope: | eq | version: | 1.0.4 | Trust: 0.9 |
THREAT TYPE
network
Trust: 0.3
TYPE
Input Validation Error
Trust: 0.3
EXTERNAL IDS
db: | BID | id: | 50277 | Trust: 0.9 |
db: | CNVD | id: | CNVD-2011-4363 | Trust: 0.6 |
REFERENCES
url: | http://newsoft-tech.blogspot.com/2010/09/d-link-dcs-2121-and-state-of-embedded.html | Trust: 0.9 |
url: | http://www.dlink.com/ | Trust: 0.3 |
CREDITS
Newsoft Tech Blog
Trust: 0.3
SOURCES
db: | CNVD | id: | CNVD-2011-4363 |
db: | BID | id: | 50277 |
LAST UPDATE DATE
2022-05-17T01:41:34.648000+00:00
SOURCES UPDATE DATE
db: | CNVD | id: | CNVD-2011-4363 | date: | 2011-10-20T00:00:00 |
db: | BID | id: | 50277 | date: | 2011-10-19T00:00:00 |
SOURCES RELEASE DATE
db: | CNVD | id: | CNVD-2011-4363 | date: | 2011-10-20T00:00:00 |
db: | BID | id: | 50277 | date: | 2011-10-19T00:00:00 |