CVE-2017-7852

HIGH

Dlink Dcs-2230l Firmware < 1.03.01 - CSRF

Title source: rule
STIX 2.1

Description

D-Link DCS cameras have a weak/insecure CrossDomain.XML file that allows sites hosting malicious Flash objects to access and/or change the device's settings via a CSRF attack. This is because of the 'allow-access-from domain' child element set to *, thus accepting requests from any domain. If a victim logged into the camera's web console visits a malicious site hosting a malicious Flash file from another Browser tab, the malicious Flash file then can send requests to the victim's DCS series Camera without knowing the credentials. An attacker can host a malicious Flash file that can retrieve Live Feeds or information from the victim's DCS series Camera, add new admin users, or make other changes to the device. Known affected devices are DCS-933L with firmware before 1.13.05, DCS-5030L, DCS-5020L, DCS-2530L, DCS-2630L, DCS-930L, DCS-932L, and DCS-932LB1.

Exploits (1)

exploitdb WRITEUP
by SlidingWindow · textwebappshardware
https://www.exploit-db.com/exploits/42074

References (1)

Core 1
Core References
Exploit, Mitigation, Third Party Advisory x_refsource_misc
https://www.qualys.com/2017/02/22/qsa-2017-02-22/qsa-2017-02-22.pdf

Scores

CVSS v3 8.8
EPSS 0.0089
EPSS Percentile 75.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-352
Status published
Products (26)
dlink/dcs-2132l_firmware < 1.08.01
dlink/dcs-2136l_firmware < 1.04.01
dlink/dcs-2210l_firmware < 1.03.01
dlink/dcs-2230l_firmware < 1.03.01
dlink/dcs-2310l_firmware < 1.08.01
dlink/dcs-2330l_firmware < 1.13.00
dlink/dcs-2332l_firmware < 1.08.01
dlink/dcs-2530l_firmware < 1.00.21
dlink/dcs-5000l_firmware < 1.02.02
dlink/dcs-5009l_firmware < 1.07.05
... and 16 more
Published Apr 24, 2017
Tracked Since Feb 18, 2026