D-Link DCS-825L devices with firmware 1.08 do not employ a suitable mechanism to prevent denial-of-service (DoS) attacks. An attacker can harm the device availability (i.e., live-online video/audio streaming) by using the hping3 tool to perform an IPv4 flood attack. Verified attacks includes SYN flooding, UDP flooding, ICMP flooding, and SYN-ACK flooding.
References
Link | Resource |
---|---|
https://dojo.bullguard.com/dojo-by-bullguard/blog/i-got-my-eyeon-you-security-vulnerabilities-in-baby-monitor/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2018-12-20 15:29
Updated : 2020-08-24 10:37
NVD link : CVE-2018-18442
Mitre link : CVE-2018-18442
JSON object : View
CWE
Products Affected
d-link
- dcs-825l_firmware
- dcs-825l