D-Link.IP.Cameras.rtpd.CGI.OS.Command.Injection

description-logoDescription

This indicates an attack attempt to exploit a remote Command Execution vulnerability in D-Link IP Cameras.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when parsing crafted HTTP requests. A remote attacker may be able to exploit this to execute arbitrary OS commands within the context of the application, via a crafted HTTP request.

affected-products-logoAffected Products

DCS-3411/3430 - firmware v1.02
DCS-5605/5635 - v1.01
DCS-1100L/1130L - v1.04
DCS-1100/1130 - v1.03
DCS-1100/1130 - v1.04_US
DCS-2102/2121 - v1.05_RU
DCS-3410 - v1.02
DCS-5230 - v1.02
DCS-5230L - v1.02
DCS-6410 - v1.00
DCS-7410 - v1.00
DCS-7510 - v1.00
WCS-1100 - v1.02

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
http://www.dlink.com/us/en/support

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)