Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device has a custom telnet daemon as a part of the busybox and retrieves the password from the shadow file using the function getspnam at address 0x00053894. Then performs a crypt operation on the password retrieved from the user at address 0x000538E0 and performs a strcmp at address 0x00053908 to check if the password is correct or incorrect. However, the /etc/shadow file is a part of CRAM-FS filesystem which means that the user cannot change the password and hence a hardcoded hash in /etc/shadow is used to match the credentials provided by the user. This is a salted hash of the string "admin" and hence it acts as a password to the device which cannot be changed as the whole filesystem is read only.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
D-Link DCS-1100和D-Link DCS-1130 信任管理问题漏洞
Vulnerability Description
D-Link DCS-1100和D-Link DCS-1130都是中国台湾友讯(D-Link)公司的一款网络摄像机。 D-Link DCS-1100和DCS-1130中存在信任管理问题漏洞,该漏洞源于程序为Telnet守护进程使用了默认的密码。攻击者可利用该漏洞登录到设备上。
CVSS Information
N/A
Vulnerability Type
N/A