An issue was discovered in D-Link 'myDlink Baby App' version 2.04.06. Whenever actions are performed from the app (e.g., change camera settings or play lullabies), it communicates directly with the Wi-Fi camera (D-Link 825L firmware 1.08) with the credentials (username and password) in base64 cleartext. An attacker could conduct an MitM attack on the local network and very easily obtain these credentials.
References
Link | Resource |
---|---|
https://dojo.bullguard.com/dojo-by-bullguard/blog/i-got-my-eyeon-you-security-vulnerabilities-in-baby-monitor/ | Exploit Third Party Advisory |
Information
Published : 2018-12-20 15:29
Updated : 2020-08-24 10:37
NVD link : CVE-2018-18767
Mitre link : CVE-2018-18767
JSON object : View
CWE
CWE-326
Inadequate Encryption Strength
Products Affected
d-link
- dcs-825l_firmware
- dcs-825l
- mydlink_baby_camera_monitor