CVE-2017-8409
moderate-risk
Published 2019-07-02
An issue was discovered on D-Link DCS-1130 devices. The device requires that a user logging to the device to provide a username and password. However, the device does not enforce the same restriction on a specific URL thereby allowing any attacker in possession of that to view the live video feed. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.
Do I need to act?
~
4.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSR...
Mailing List
https://seclists.org/bugtraq/2019/Jun/8
Third Party Advisory
http://packetstormsecurity.com/files/153226/Dlink-DCS-1130-Command-Injection-CSR...
Mailing List
https://seclists.org/bugtraq/2019/Jun/8
38
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
7/34 · Low
Exposure
5/34 · Minimal