ID

VAR-201412-0435


CVE

CVE-2014-9234


TITLE

D-link IP camera DCS-2103 Firmware cgi-bin/sddownload.cgi Vulnerable to directory traversal

Trust: 0.8

sources: JVNDB: JVNDB-2014-005761

DESCRIPTION

Directory traversal vulnerability in cgi-bin/sddownload.cgi in D-link IP camera DCS-2103 with firmware 1.0.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. D-link IP camera The DCS-2103 is a camera for IP surveillance solutions. ------------------------- Affected products: ------------------------- Vulnerable is the next model: D-Link DCS-2103, Firmware 1.0.0. This model with other firmware versions also must be vulnerable. I found these vulnerabilities at 11.07.2014 and later informed D-Link. But they haven't answered. It looks like they are busy with fixing vulnerabilities in DAP-1360, which I wrote about earlier. I found this and other web cameras during summer to watch terrorists activities in Donetsk and Lugansks regions of Ukraine (http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2014-October/009056.html). You can watch my videos in the playlist Ukrainian Cyber Forces: video reconnaissance http://www.youtube.com/playlist?list=PLk7NS9SMadnj7fwAQJgkbKQdCGTKAFI9Q. Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua

Trust: 2.61

sources: NVD: CVE-2014-9234 // JVNDB: JVNDB-2014-005761 // CNVD: CNVD-2014-08721 // BID: 77773 // VULHUB: VHN-77179 // PACKETSTORM: 129138

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

category:['camera device']sub_category:IP camera

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2014-08721

AFFECTED PRODUCTS

vendor:d linkmodel:dcs-2103 hd cube network camerascope:eqversion:1.0.0

Trust: 1.9

vendor:d linkmodel:d-link dcs-2103scope: - version: -

Trust: 0.8

vendor:d linkmodel:d-link dcs-2103scope:eqversion:1.0.0

Trust: 0.8

vendor:d linkmodel:ip camera dcs-2103 withscope:eqversion:1.0.0

Trust: 0.6

sources: CNVD: CNVD-2014-08721 // BID: 77773 // JVNDB: JVNDB-2014-005761 // CNNVD: CNNVD-201412-056 // NVD: CVE-2014-9234

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-9234
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-9234
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-08721
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201412-056
value: MEDIUM

Trust: 0.6

VULHUB: VHN-77179
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-9234
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-08721
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-77179
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-08721 // VULHUB: VHN-77179 // JVNDB: JVNDB-2014-005761 // CNNVD: CNNVD-201412-056 // NVD: CVE-2014-9234

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-77179 // JVNDB: JVNDB-2014-005761 // NVD: CVE-2014-9234

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201412-056

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201412-056

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-005761

PATCH

title:DCS-2103url:http://www.dlink.ru/mn/products/1433/1453.html

Trust: 0.8

title:D-link IP camera DCS-2103 with firmware directory traversal vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/52456

Trust: 0.6

sources: CNVD: CNVD-2014-08721 // JVNDB: JVNDB-2014-005761

EXTERNAL IDS

db:NVDid:CVE-2014-9234

Trust: 3.5

db:PACKETSTORMid:129138

Trust: 2.6

db:JVNDBid:JVNDB-2014-005761

Trust: 0.8

db:CNNVDid:CNNVD-201412-056

Trust: 0.7

db:CNVDid:CNVD-2014-08721

Trust: 0.6

db:BIDid:77773

Trust: 0.4

db:OTHERid:NONE

Trust: 0.1

db:VULHUBid:VHN-77179

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2014-08721 // VULHUB: VHN-77179 // BID: 77773 // JVNDB: JVNDB-2014-005761 // PACKETSTORM: 129138 // CNNVD: CNNVD-201412-056 // NVD: CVE-2014-9234

REFERENCES

url:http://packetstormsecurity.com/files/129138/d-link-dcs-2103-directory-traversal.html

Trust: 2.5

url:http://websecurity.com.ua/7250/

Trust: 2.3

url:http://seclists.org/fulldisclosure/2014/nov/42

Trust: 2.0

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9234

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9234

Trust: 0.8

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:http://www.youtube.com/playlist?list=plk7ns9smadnj7fwaqjgkbkqdcgtkafi9q.

Trust: 0.1

url:http://websecurity.com.ua

Trust: 0.1

url:http://websecurity.com.ua/7250/).

Trust: 0.1

url:http://site/cgi-bin/sddownload.cgi?file=/

Trust: 0.1

url:http://site/cgi-bin/sddownload.cgi?file=/../../etc/passwd

Trust: 0.1

url:http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2014-october/009056.html).

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2014-08721 // VULHUB: VHN-77179 // BID: 77773 // JVNDB: JVNDB-2014-005761 // PACKETSTORM: 129138 // CNNVD: CNNVD-201412-056 // NVD: CVE-2014-9234

CREDITS

Unknown

Trust: 0.3

sources: BID: 77773

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2014-08721
db:VULHUBid:VHN-77179
db:BIDid:77773
db:JVNDBid:JVNDB-2014-005761
db:PACKETSTORMid:129138
db:CNNVDid:CNNVD-201412-056
db:NVDid:CVE-2014-9234

LAST UPDATE DATE

2025-04-13T21:08:58.839000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-08721date:2014-12-05T00:00:00
db:VULHUBid:VHN-77179date:2014-12-05T00:00:00
db:BIDid:77773date:2014-12-03T00:00:00
db:JVNDBid:JVNDB-2014-005761date:2014-12-05T00:00:00
db:CNNVDid:CNNVD-201412-056date:2014-12-04T00:00:00
db:NVDid:CVE-2014-9234date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-08721date:2014-12-05T00:00:00
db:VULHUBid:VHN-77179date:2014-12-03T00:00:00
db:BIDid:77773date:2014-12-03T00:00:00
db:JVNDBid:JVNDB-2014-005761date:2014-12-05T00:00:00
db:PACKETSTORMid:129138date:2014-11-16T23:02:22
db:CNNVDid:CNNVD-201412-056date:2014-12-04T00:00:00
db:NVDid:CVE-2014-9234date:2014-12-03T21:59:04.290