Lucene search

K
DlinkDcs-5020l Firmware

5 matches found

CVE
CVE
added 2017/04/24 10:59 a.m.71 views

CVE-2017-7852

D-Link DCS cameras have a weak/insecure CrossDomain.XML file that allows sites hosting malicious Flash objects to access and/or change the device's settings via a CSRF attack. This is because of the 'allow-access-from domain' child element set to *, thus accepting requests from any domain. If a vic...

8.8CVSS8.5AI score0.01001EPSS
CVE
CVE
added 2018/05/01 4:29 p.m.54 views

CVE-2017-17020

On D-Link DCS-5009 devices with firmware 1.08.11 and earlier, DCS-5010 devices with firmware 1.14.09 and earlier, and DCS-5020L devices with firmware before 1.15.01, command injection in alphapd (binary responsible for running the camera's web server) allows remote authenticated attackers to execut...

8.8CVSS8.8AI score0.06959EPSS
Web
CVE
CVE
added 2018/12/20 11:29 p.m.54 views

CVE-2018-18441

D-Link DCS series Wi-Fi cameras expose sensitive information regarding the device configuration. The affected devices include many of DCS series, such as: DCS-936L, DCS-942L, DCS-8000LH, DCS-942LB1, DCS-5222L, DCS-825L, DCS-2630L, DCS-820L, DCS-855L, DCS-2121, DCS-5222LB1, DCS-5020L, and many more....

7.5CVSS7.4AI score0.01152EPSS
CVE
CVE
added 2019/05/06 8:29 p.m.54 views

CVE-2019-10999

The D-Link DCS series of Wi-Fi cameras contains a stack-based buffer overflow in alphapd, the camera's web server. The overflow allows a remotely authenticated attacker to execute arbitrary code by providing a long string in the WEPEncryption parameter when requesting wireless.htm. Vulnerable devic...

8.8CVSS9AI score0.35804EPSS
Web
CVE
CVE
added 2025/05/27 12:15 a.m.42 views

CVE-2025-5215

A vulnerability classified as critical has been found in D-Link DCS-5020L 1.01_B2. This affects the function websReadEvent of the file /rame/ptdc.cgi. The manipulation of the argument Authorization leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has...

9.8CVSS7.1AI score0.00106EPSS
Web