CVE-2018-18441
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
20/12/2018
Last modified:
26/04/2023
Description
D-Link DCS series Wi-Fi cameras expose sensitive information regarding the device configuration. The affected devices include many of DCS series, such as: DCS-936L, DCS-942L, DCS-8000LH, DCS-942LB1, DCS-5222L, DCS-825L, DCS-2630L, DCS-820L, DCS-855L, DCS-2121, DCS-5222LB1, DCS-5020L, and many more. There are many affected firmware versions starting from 1.00 and above. The configuration file can be accessed remotely through: /common/info.cgi, with no authentication. The configuration file include the following fields: model, product, brand, version, build, hw_version, nipca version, device name, location, MAC address, IP address, gateway IP address, wireless status, input/output settings, speaker, and sensor settings.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:d-link:dcs-936l_firmware:*:*:*:*:*:*:*:* | 1.00 (including) | |
| cpe:2.3:h:dlink:dcs-936l:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dcs-942l_firmware:*:*:*:*:*:*:*:* | 1.00 (including) | |
| cpe:2.3:h:dlink:dcs-942l:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:d-link:dcs-8000lh_firmware:*:*:*:*:*:*:*:* | 1.00 (including) | |
| cpe:2.3:h:dlink:dcs-8000lh:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:d-link:dcs-942lb1_firmware:*:*:*:*:*:*:*:* | 1.00 (including) | |
| cpe:2.3:h:dlink:dcs-942lb1:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:d-link:dcs-5222l_firmware:*:*:*:*:*:*:*:* | 1.00 (including) | |
| cpe:2.3:h:dlink:dcs-5222l:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:d-link:dcs-825l_firmware:*:*:*:*:*:*:*:* | 1.00 (including) | |
| cpe:2.3:h:dlink:dcs-825l:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:d-link:dcs-2630l_firmware:*:*:*:*:*:*:*:* | 1.00 (including) | |
| cpe:2.3:h:dlink:dcs-2630l:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:d-link:dcs-820l_firmware:*:*:*:*:*:*:*:* | 1.00 (including) |
To consult the complete list of CPE names with products and versions, see this page



