漏洞标题
N/A
漏洞描述信息
在D-Link DCS-1130和DCS-1100设备上发现了一个问题。设备的/sbin文件夹中的二进制rtspd处理所有设备接收到的rtsp连接。似乎二进制在地址0x00012CF4加载了一个名为“Authenticate”的标尺,它表示在允许访问视频流之前用户是否需要进行身份验证。默认情况下,这个标尺的值为零,可以通过HTTP界面和网络设置标签进行设置/取消。设备要求用户在设备上的HTTP管理界面上登录并提供有效的用户名和密码。然而,由于默认勾选的 checkbox 没有被勾选,因此设备默认情况下不会执行相同的限制,从而允许拥有摄像机外部IP地址的任何攻击者查看实时视频流。由于There are more than 100,000 D-Link devices out there,这一攻击的严重程度被扩大了。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
An issue was discovered on D-Link DCS-1130 and DCS-1100 devices. The binary rtspd in /sbin folder of the device handles all the rtsp connections received by the device. It seems that the binary loads at address 0x00012CF4 a flag called "Authenticate" that indicates whether a user should be authenticated or not before allowing access to the video feed. By default, the value for this flag is zero and can be set/unset using the HTTP interface and network settings tab as shown below. The device requires that a user logging to the HTTP management interface of the device to provide a valid username and password. However, the device does not enforce the same restriction by default on RTSP URL due to the checkbox unchecked by default, thereby allowing any attacker in possession of external IP address of the camera to view the live video feed. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
D-Link DCS-1100和D-Link DCS-1130 授权问题漏洞
漏洞描述信息
D-Link DCS-1100和D-Link DCS-1130都是中国台湾友讯(D-Link)公司的一款网络摄像机。 D-Link DCS-1130和DCS-1100中存在安全漏洞,该漏洞源于在默认情况下程序没有进行身份验证检查。攻击者可利用该漏洞查看摄像头所拍摄的图像。
CVSS信息
N/A
漏洞类别
授权问题