Lucene search

K
DlinkDcs-5020l Firmware

5 matches found

CVE
CVE
added 2017/04/24 10:59 a.m.71 views

CVE-2017-7852

D-Link DCS cameras have a weak/insecure CrossDomain.XML file that allows sites hosting malicious Flash objects to access and/or change the device's settings via a CSRF attack. This is because of the 'allow-access-from domain' child element set to *, thus accepting requests from any domain. If a vic...

8.8CVSS8.5AI score0.01001EPSS
CVE
CVE
added 2018/05/01 4:29 p.m.54 views

CVE-2017-17020

On D-Link DCS-5009 devices with firmware 1.08.11 and earlier, DCS-5010 devices with firmware 1.14.09 and earlier, and DCS-5020L devices with firmware before 1.15.01, command injection in alphapd (binary responsible for running the camera's web server) allows remote authenticated attackers to execut...

8.8CVSS8.8AI score0.06959EPSS
CVE
CVE
added 2018/12/20 11:29 p.m.54 views

CVE-2018-18441

D-Link DCS series Wi-Fi cameras expose sensitive information regarding the device configuration. The affected devices include many of DCS series, such as: DCS-936L, DCS-942L, DCS-8000LH, DCS-942LB1, DCS-5222L, DCS-825L, DCS-2630L, DCS-820L, DCS-855L, DCS-2121, DCS-5222LB1, DCS-5020L, and many more....

7.5CVSS7.4AI score0.01152EPSS
CVE
CVE
added 2019/05/06 8:29 p.m.53 views

CVE-2019-10999

The D-Link DCS series of Wi-Fi cameras contains a stack-based buffer overflow in alphapd, the camera's web server. The overflow allows a remotely authenticated attacker to execute arbitrary code by providing a long string in the WEPEncryption parameter when requesting wireless.htm. Vulnerable devic...

8.8CVSS9AI score0.36891EPSS
CVE
CVE
added 2025/05/27 12:15 a.m.42 views

CVE-2025-5215

A vulnerability classified as critical has been found in D-Link DCS-5020L 1.01_B2. This affects the function websReadEvent of the file /rame/ptdc.cgi. The manipulation of the argument Authorization leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has...

9.8CVSS7.1AI score0.00091EPSS