CVE-2018-18441
moderate-risk
Published 2018-12-20
D-Link DCS series Wi-Fi cameras expose sensitive information regarding the device configuration. The affected devices include many of DCS series, such as: DCS-936L, DCS-942L, DCS-8000LH, DCS-942LB1, DCS-5222L, DCS-825L, DCS-2630L, DCS-820L, DCS-855L, DCS-2121, DCS-5222LB1, DCS-5020L, and many more. There are many affected firmware versions starting from 1.00 and above. The configuration file can be accessed remotely through: <Camera-IP>/common/info.cgi, with no authentication. The configuration file include the following fields: model, product, brand, version, build, hw_version, nipca version, device name, location, MAC address, IP address, gateway IP address, wireless status, input/output settings, speaker, and sensor settings.
Do I need to act?
-
0.49% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (18)
Dcs-936L Firmware
Dcs-942L Firmware
Dcs-8000Lh Firmware
Dcs-942Lb1 Firmware
Dcs-5222L Firmware
Dcs-825L Firmware
Dcs-2630L Firmware
Dcs-820L Firmware
Dcs-855L Firmware
Dcs-2121 Firmware
Dcs-5222Lb1 Firmware
Dcs-5020L Firmware
Dcs-8100Lh Firmware
Dcs-932L Firmware
Dcs-2102 Firmware
Dcs-933L Firmware
47
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
2/34 · Minimal
Exposure
19/34 · Moderate