Description
D-Link DCS series Wi-Fi cameras expose sensitive information regarding the device configuration. The affected devices include many of DCS series, such as: DCS-936L, DCS-942L, DCS-8000LH, DCS-942LB1, DCS-5222L, DCS-825L, DCS-2630L, DCS-820L, DCS-855L, DCS-2121, DCS-5222LB1, DCS-5020L, and many more. There are many affected firmware versions starting from 1.00 and above. The configuration file can be accessed remotely through: <Camera-IP>/common/info.cgi, with no authentication. The configuration file include the following fields: model, product, brand, version, build, hw_version, nipca version, device name, location, MAC address, IP address, gateway IP address, wireless status, input/output settings, speaker, and sensor settings.
Exploits (1)
nomisec
WORKING POC
1 stars
by bayazid-bit · poc
https://github.com/bayazid-bit/CVE-2018-18441-exploit
References (1)
Core 1
Core References
Exploit, Third Party Advisory x_refsource_misc
https://dojo.bullguard.com/dojo-by-bullguard/blog/i-got-my-eyeon-you-security-vulnerabilities-in-baby-monitor/
Scores
CVSS v3
7.5
EPSS
0.0049
EPSS Percentile
65.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-200
Status
published
Products (18)
d-link/dcs-2102_firmware
1.00
d-link/dcs-2121_firmware
1.00
d-link/dcs-2630l_firmware
1.00
d-link/dcs-5222l_firmware
1.00
d-link/dcs-5222lb1_firmware
1.00
d-link/dcs-8000lh_firmware
1.00
d-link/dcs-8100lh_firmware
1.00
d-link/dcs-820l_firmware
1.00
d-link/dcs-825l_firmware
1.00
d-link/dcs-855l_firmware
1.00
... and 8 more
Published
Dec 20, 2018
Tracked Since
Feb 18, 2026