Description
The D-Link DCS series of Wi-Fi cameras contains a stack-based buffer overflow in alphapd, the camera's web server. The overflow allows a remotely authenticated attacker to execute arbitrary code by providing a long string in the WEPEncryption parameter when requesting wireless.htm. Vulnerable devices include DCS-5009L (1.08.11 and below), DCS-5010L (1.14.09 and below), DCS-5020L (1.15.12 and below), DCS-5025L (1.03.07 and below), DCS-5030L (1.04.10 and below), DCS-930L (2.16.01 and below), DCS-931L (1.14.11 and below), DCS-932L (2.17.01 and below), DCS-933L (1.14.11 and below), and DCS-934L (1.05.04 and below).
Published: 2019-05-06
Score: 8.8 High
EPSS: 35.8% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Dlink Dcs-5009l Dcs-5009l Firmware Dcs-5010l Dcs-5010l Firmware Dcs-5020l Dcs-5020l Firmware Dcs-5025l Dcs-5025l Firmware Dcs-5030l Dcs-5030l Firmware Dcs-930l Dcs-930l Firmware Dcs-931l Dcs-931l Firmware Dcs-932l Dcs-932l Firmware Dcs-933l Dcs-933l Firmware Dcs-934l Dcs-934l Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T22:40:15.983Z

Reserved: 2019-04-08T00:00:00.000Z

Link: CVE-2019-10999

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-06T20:29:01.210

Modified: 2024-11-21T04:20:19.520

Link: CVE-2019-10999

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses