漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
D-Link DCS cameras have a weak/insecure CrossDomain.XML file that allows sites hosting malicious Flash objects to access and/or change the device's settings via a CSRF attack. This is because of the 'allow-access-from domain' child element set to *, thus accepting requests from any domain. If a victim logged into the camera's web console visits a malicious site hosting a malicious Flash file from another Browser tab, the malicious Flash file then can send requests to the victim's DCS series Camera without knowing the credentials. An attacker can host a malicious Flash file that can retrieve Live Feeds or information from the victim's DCS series Camera, add new admin users, or make other changes to the device. Known affected devices are DCS-933L with firmware before 1.13.05, DCS-5030L, DCS-5020L, DCS-2530L, DCS-2630L, DCS-930L, DCS-932L, and DCS-932LB1.
漏洞信息
N/A
漏洞
N/A
漏洞
多款D-Link DCS摄像头跨站请求伪造漏洞
漏洞信息
D-Link DCS-933L等都是友讯(D-Link)公司的无线监控摄像头设备。 多款D-Link DCS摄像头中存在安全漏洞。攻击者可借助特意的Flash文件利用该漏洞检索Live Feeds或Camera中的信息,添加新用户或更改设备。以下产品受到影响:D-Link DCS-5030L;DCS-5020L;DCS-2530L;DCS-2630L;DCS-930L;DCS-932L;DCS-932LB1;使用1.13.05之前的版本固件的DCS-933L。
漏洞信息
N/A
漏洞
N/A