VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201906-0938 CVE-2019-11877 PIX-Link Repeater/Router LV-WR09 Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
XSS on the PIX-Link Repeater/Router LV-WR09 with firmware v28K.MiniRouter.20180616 allows attackers to steal credentials without being connected to the network. The attack vector is a crafted ESSID. PIX-Link Repeater/Router LV-WR09 Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. PIX-Link Repeater/Router LV-WR09 is a wireless WiFi signal extender. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-201906-0587 CVE-2019-12780 Belkin Wemo Enabled Crock-Pot Command injection vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
The Belkin Wemo Enabled Crock-Pot allows command injection in the Wemo UPnP API via the SmartDevURL argument to the SetSmartDevInfo action. A simple POST request to /upnp/control/basicevent1 can allow an attacker to execute commands without authentication. Belkin Wemo Enabled Crock-Pot Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Belkin Wemo Enabled Crock-Pot is a smart slow cooker. A security vulnerability exists in the Wemo UPnP API in the Belkin Wemo Enabled Crock-Pot
VAR-201906-0351 CVE-2019-5243 Huawei HG255s Input validation vulnerability CVSS V2: 4.3
CVSS V3: 4.3
Severity: MEDIUM
There is a Clickjacking vulnerability in Huawei HG255s product. An attacker may trick user to click a link and affect the integrity of a device by exploiting this vulnerability. Huawei HG255s Contains an input validation vulnerability.Information may be tampered with. HuaweiHG255s is a wireless router from China's Huawei company
VAR-201906-1267 No CVE Denial of service vulnerability in Agilent's real-time database system CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
The Agilent real-time database system is a device for collecting, storing and managing equipment status and production process data from various control systems and fieldbuses, providing a unified enterprise-level real-time data management platform for process companies. There is a denial of service vulnerability in the Agilent real-time database system, which can be exploited by an attacker to cause a denial of service
VAR-201906-0986 CVE-2018-20352 Cesanta Mongoose Embedded Web Server Library Uses freed memory vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
Use-after-free vulnerability in the mg_cgi_ev_handler function in mongoose.c in Cesanta Mongoose Embedded Web Server Library 6.13 and earlier allows a denial of service (application crash) or remote code execution
VAR-201906-0395 CVE-2019-6241 Bevywise Networks MQTTRoute Input Validation Error Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
In Bevywise MQTTRoute 1.1 build 1018-002, a connect packet combined with a malformed unsubscribe request packet can be used to cause a Denial of Service attack against the broker. Bevywise MQTTRoute Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Bevywise Networks MQTTRoute is an MQTT server used by Bevywise Networks of India for secure connection of IoT devices. There are security vulnerabilities in Bevywise Networks MQTTRoute 1.1 build 1018-002. An attacker could use this vulnerability to cause a denial of service
VAR-201906-0706 CVE-2017-10718 Shekar Endoscope Vulnerabilities related to certificate and password management CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that any malicious user connecting to the device can change the default SSID and password thereby denying the owner an access to his/her own device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries. Shekar Endoscope Contains vulnerabilities related to certificate and password management.Information may be tampered with. SHEKARTechnologyEndoscope is a portable endoscope device from SHEKARTechnology, China. There is a security hole in SHEKARTechnologyEndoscope. An attacker could use this vulnerability to modify the default SSID and password, preventing users from accessing the device or causing other hazards. There is a security vulnerability in SHEKAR Technology Endoscope
VAR-201906-0708 CVE-2017-10720 Shekar Endoscope Buffer error vulnerability CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the desktop application used to connect to the device suffers from a stack overflow if more than 26 characters are passed to it as the Wi-Fi name. This application is installed on the device and an attacker who can provide the right payload can execute code on the user's system directly. Any breach of this system can allow an attacker to get access to all the data that the user has access too. The application uses a dynamic link library(DLL) called "avilib.dll" which is used by the application to send binary packets to the device that allow to control the device. One such action that the DLL provides is change password in the function "sendchangename" which allows a user to change the Wi-Fi name on the device. This function calls a sub function "sub_75876EA0" at address 0x758784F8. The function determines which action to execute based on the parameters sent to it. The "sendchangename" passes the datastring as the second argument which is the name we enter in the textbox and integer 1 as first argument. The rest of the 3 arguments are set to 0. The function "sub_75876EA0" at address 0x75876F19 uses the first argument received and to determine which block to jump to. Since the argument passed is 1, it jumps to 0x75876F20 and proceeds from there to address 0x75876F56 which calculates the length of the data string passed as the first parameter. This length and the first argument are then passed to the address 0x75877001 which calls the memmove function which uses a stack address as the destination where the password typed by us is passed as the source and length calculated above is passed as the number of bytes to copy which leads to a stack overflow. Shekar Endoscope Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SHEKARTechnologyEndoscope is a portable endoscope device from SHEKARTechnology, China. A buffer overflow vulnerability exists in SHEKARTechnologyEndoscope. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow
VAR-201906-0711 CVE-2017-10723 Shekar Endoscope Buffer error vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that an attacker connected to the device Wi-Fi SSID can exploit a memory corruption issue and execute remote code on the device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries. The firmware contains binary uvc_stream that is the UDP daemon which is responsible for handling all the UDP requests that the device receives. The client application sends a UDP request to change the Wi-Fi name which contains the following format: "SETCMD0001+0001+[2 byte length of wifiname]+[Wifiname]. This request is handled by "control_Dev_thread" function which at address "0x00409AE0" compares the incoming request and determines if the 10th byte is 01 and if it is then it redirects to 0x0040A74C which calls the function "setwifiname". The function "setwifiname" uses a memcpy function but uses the length of the payload obtained by using strlen function as the third parameter which is the number of bytes to copy and this allows an attacker to overflow the function and control the $PC value. Shekar Endoscope Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SHEKARTechnologyEndoscope is a portable endoscope device from SHEKARTechnology, China. A buffer overflow vulnerability exists in SHEKARTechnologyEndoscope. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow
VAR-201906-0712 CVE-2017-10724 Shekar Endoscope Buffer error vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that an attacker connected to the device Wi-Fi SSID can exploit a memory corruption issue and execute remote code on the device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries. The firmware contains binary uvc_stream that is the UDP daemon which is responsible for handling all the UDP requests that the device receives. The client application sends a UDP request to change the Wi-Fi name which contains the following format: "SETCMD0001+0002+[2 byte length of wifipassword]+[Wifipassword]. This request is handled by "control_Dev_thread" function which at address "0x00409AE4" compares the incoming request and determines if the 10th byte is 02 and if it is then it redirects to 0x0040A7D8, which calls the function "setwifipassword". The function "setwifipassword" uses a memcpy function but uses the length of the payload obtained by using strlen function as the third parameter which is the number of bytes to copy and this allows an attacker to overflow the function and control the $PC value. Shekar Endoscope Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SHEKARTechnologyEndoscope is a portable endoscope device from SHEKARTechnology, China. A buffer overflow vulnerability exists in SHEKARTechnologyEndoscope that could be exploited by an attacker to cause a buffer overflow or heap overflow. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations
VAR-201906-0707 CVE-2017-10719 Shekar Endoscope Vulnerable to information disclosure CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the device has default Wi-Fi credentials that are exactly the same for every device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries. Shekar Endoscope Contains an information disclosure vulnerability.Information may be obtained. SHEKARTechnologyEndoscope is a portable endoscope device from SHEKARTechnology, China. There is an authorization vulnerability in SHEKARTechnologyEndoscope. The vulnerability stems from a lack of authentication in the network system or product or insufficient strength of authentication. No detailed vulnerability details are currently available. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components
VAR-201906-0710 CVE-2017-10722 Shekar Endoscope Buffer error vulnerability CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the desktop application used to connect to the device suffers from a stack overflow if more than 26 characters are passed to it as the Wi-Fi password. This application is installed on the device and an attacker who can provide the right payload can execute code on the user's system directly. Any breach of this system can allow an attacker to get access to all the data that the user has access too. The application uses a dynamic link library(DLL) called "avilib.dll" which is used by the application to send binary packets to the device that allow to control the device. One such action that the DLL provides is change password in the function "sendchangepass" which allows a user to change the Wi-Fi password on the device. This function calls a sub function "sub_75876EA0" at address 0x7587857C. The function determines which action to execute based on the parameters sent to it. The "sendchangepass" passes the datastring as the second argument which is the password we enter in the textbox and integer 2 as first argument. The rest of the 3 arguments are set to 0. The function "sub_75876EA0" at address 0x75876F19 uses the first argument received and to determine which block to jump to. Since the argument passed is 2, it jumps to 0x7587718C and proceeds from there to address 0x758771C2 which calculates the length of the data string passed as the first parameter.This length and the first argument are then passed to the address 0x7587726F which calls a memmove function which uses a stack address as the destination where the password typed by us is passed as the source and length calculated above is passed as the number of bytes to copy which leads to a stack overflow. Shekar Endoscope Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SHEKAR Technology Endoscope is a portable endoscope device from China SHEKAR Technology Company. A buffer error vulnerability exists in SHEKAR Technology Endoscope. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
VAR-201906-0709 CVE-2017-10721 Shekar Endoscope Access control vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the device has Telnet functionality enabled by default. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries. Shekar Endoscope Contains an access control vulnerability.Information may be tampered with. SHEKAR Technology Endoscope is a portable endoscope device from China SHEKAR Technology Company. There is a security vulnerability in SHEKAR Technology Endoscope. Attackers can exploit this vulnerability to obtain video content and images or cause other harm
VAR-201907-1080 CVE-2017-8228 Amcrest IPM-721S Vulnerabilities related to authorization, authority, and access control in devices

Related entries in the VARIoT exploits database: VAR-E-201906-0064
CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices mishandle reboots within the past two hours. Amcrest cloud services does not perform a thorough verification when allowing the user to add a new camera to the user's account to ensure that the user actually owns the camera other than knowing the serial number of the camera. This can allow an attacker who knows the serial number to easily add another user's camera to an attacker's cloud account and control it completely. This is possible in case of any camera that is currently not a part of an Amcrest cloud account or has been removed from the user's cloud account. Also, another requirement for a successful attack is that the user should have rebooted the camera in the last two hours. However, both of these conditions are very likely for new cameras that are sold over the Internet at many ecommerce websites or vendors that sell the Amcrest products. The successful attack results in an attacker being able to completely control the camera which includes being able to view and listen on what the camera can see, being able to change the motion detection settings and also be able to turn the camera off without the user being aware of it. Note: The same attack can be executed using the Amcrest Cloud mobile application. Amcrest IPM-721S Devices have vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Amcrest IPM-721S is a wireless IP camera from Amcrest. An unknown security vulnerability exists in the AmcrestIPM-721SV2.420.AC00.16.R.20160909 release
VAR-201907-1081 CVE-2017-8229 Amcrest IPM-721S Vulnerabilities related to certificate and password management in devices

Related entries in the VARIoT exploits database: VAR-E-201906-0064
CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices allow an unauthenticated attacker to download the administrative credentials. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that sets up the default credentials on the device. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function sub_436D6 in IDA pro is identified to be setting up the configuration for the device. If one scrolls to the address 0x000437C2 then one can see that /current_config is being set as an ALIAS for /mnt/mtd/Config folder on the device. If one TELNETs into the device and navigates to /mnt/mtd/Config folder, one can observe that it contains various files such as Account1, Account2, SHAACcount1, etc. This means that if one navigates to http://[IPofcamera]/current_config/Sha1Account1 then one should be able to view the content of the files. The security researchers assumed that this was only possible only after authentication to the device. However, when unauthenticated access tests were performed for the same URL as provided above, it was observed that the device file could be downloaded without any authentication. Amcrest IPM-721S The device contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Amcrest IPM-721S is a wireless IP camera from Amcrest. A security vulnerability exists in the AmcrestIPM-721SV2.420.AC00.16.R.20160909 release
VAR-201907-1079 CVE-2017-8227 Amcrest IPM-721S Vulnerabilities related to security functions in devices

Related entries in the VARIoT exploits database: VAR-E-201906-0064
CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices have a timeout policy to wait for 5 minutes in case 30 incorrect password attempts are detected using the Web and HTTP API interface provided by the device. However, if the same brute force attempt is performed using the ONVIF specification (which is supported by the same binary) then there is no account lockout or timeout executed. This can allow an attacker to circumvent the account protection mechanism and brute force the credentials. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that performs the credential check in the binary for the ONVIF specification. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function at address 00671618 in IDA pro is parses the WSSE security token header. The sub_ 603D8 then performs the authentication check and if it is incorrect passes to the function sub_59F4C which prints the value "Sender not authorized.". Amcrest IPM-721S The device contains vulnerabilities related to security functions.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Amcrest IPM-721S is a wireless IP camera from Amcrest. A vulnerability exists in the AmcrestIPM-721SV2.420.AC00.16.R.20160909 release
VAR-201907-1078 CVE-2017-8226 Amcrest IPM-721S Vulnerabilities related to the use of hard-coded credentials on devices

Related entries in the VARIoT exploits database: VAR-E-201906-0064
CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices have default credentials that are hardcoded in the firmware and can be extracted by anyone who reverses the firmware to identify them. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that sets up the default credentials on the device. If one opens this binary in IDA-pro, one will notice that this follows a ARM little endian format. The function sub_3DB2FC in IDA pro is identified to be setting up the values at address 0x003DB5A6. The sub_5C057C then sets this value and adds it to the Configuration files in /mnt/mtd/Config/Account1 file. Amcrest IPM-721S The device contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Amcrest IPM-721S is a wireless IP camera from Amcrest. An authorization issue vulnerability exists in the AmcrestIPM-721SV2.420.AC00.16.R.20160909 release. The vulnerability stems from a lack of authentication in the network system or product or insufficient strength of authentication. No detailed vulnerability details are currently available. There is a trust management vulnerability in Amcrest IPM-721S V2.420.AC00.16.R.20160909. Attackers can use default passwords or hard-coded passwords, hard-coded certificates, etc. to attack affected components
VAR-201907-1082 CVE-2017-8230 Amcrest IPM-721S Vulnerabilities related to authorization, authority, and access control in devices

Related entries in the VARIoT exploits database: VAR-E-201906-0064
CVSS V2: 4.0
CVSS V3: 8.8
Severity: HIGH
On Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices, the users on the device are divided into 2 groups "admin" and "user". However, as a part of security analysis it was identified that a low privileged user who belongs to the "user" group and who has access to login in to the web administrative interface of the device can add a new administrative user to the interface using HTTP APIs provided by the device and perform all the actions as an administrative user by using that account. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable functions that performs the various action described in HTTP APIs. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function at address 0x00429084 in IDA pro is the one that processes the HTTP API request for "addUser" action. If one traces the calls to this function, it can be clearly seen that the function sub_ 41F38C at address 0x0041F588 parses the call received from the browser and passes it to the "addUser" function without any authorization check. Amcrest IPM-721S Devices have vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Amcrest IPM-721S is a wireless IP camera from Amcrest. An unknown vulnerability exists in the AmcrestIPM-721SV2.420.AC00.16.R.20160909 release. There is a security vulnerability in the Amcrest IPM-721S V2.420.AC00.16.R.20160909 version
VAR-201907-1073 CVE-2017-8413 D-Link DCS-1100 and DCS-1130 Command injection vulnerability in devices

Related entries in the VARIoT exploits database: VAR-E-201906-0081
CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device runs a custom daemon on UDP port 5978 which is called "dldps2121" and listens for broadcast packets sent on 255.255.255.255. This daemon handles custom D-Link UDP based protocol that allows D-Link mobile applications and desktop applications to discover D-Link devices on the local network. The binary processes the received UDP packets sent from any device in "main" function. One path in the function traverses towards a block of code that handles commands to be executed on the device. The custom protocol created by D-Link follows the following pattern: Packetlen, Type of packet; M=MAC address of device or broadcast; D=Device Type;C=base64 encoded command string;test=1111. If a packet is received with the packet type being "S" or 0x53 then the string passed in the "C" parameter is base64 decoded and then executed by passing into a System API. We can see at address 0x00009B44 that the string received in packet type subtracts 0x31 or "1" from the packet type and is compared against 0x22 or "double quotes". If that is the case, then the packet is sent towards the block of code that executes a command. Then the value stored in "C" parameter is extracted at address 0x0000A1B0. Finally, the string received is base 64 decoded and passed on to the system API at address 0x0000A2A8 as shown below. The same form of communication can be initiated by any process including an attacker process on the mobile phone or the desktop and this allows a third-party application on the device to execute commands on the device without any authentication by sending just 1 UDP packet with custom base64 encoding. D-Link DCS-1100 and DCS-1130 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The D-LinkDCS-1100 and D-LinkDCS-1130 are both network cameras from D-Link Corporation of Taiwan, China. A cross-site request forgery vulnerability exists in the D-LinkDCS-1100 and DCS-1130 devices. A local attacker can exploit this vulnerability to execute commands without authentication
VAR-201907-1077 CVE-2017-8417 D-Link DCS-1100 and DCS-1130 Vulnerability in certificate / password management on devices

Related entries in the VARIoT exploits database: VAR-E-201906-0081
CVSS V2: 3.3
CVSS V3: 8.8
Severity: HIGH
An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device requires that a user logging into the device provide a username and password. However, the device allows D-Link apps on the mobile devices and desktop to communicate with the device without any authentication. As a part of that communication, the device uses custom version of base64 encoding to pass data back and forth between the apps and the device. However, the same form of communication can be initiated by any process including an attacker process on the mobile phone or the desktop and this allows a third party to retrieve the device's password without any authentication by sending just 1 UDP packet with custom base64 encoding. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there. D-Link DCS-1100 and DCS-1130 The device contains a certificate / password management vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. The D-LinkDCS-1100 and D-LinkDCS-1130 are both network cameras from D-Link Corporation of Taiwan, China. A cross-site request forgery vulnerability exists in the D-LinkDCS-1100 and DCS-1130. The attacker can use the vulnerability to access the management interface by sending a simple UDP packet to view the captured image