Researchers found leak that take D-Link WiFi camera allows

Jun

9

2016

Security Researchers company Senrio found a leak in the firmware of the D-Link DCS-930L wifi camera, the execution of arbitrary code enables remote. A patch is under construction.

d-link 930L The vulnerability relates to a stack overflow that can be triggered by a single command that contains assembly code. Therefore an attacker could execute malicious code on the device, for example, change the password to access the camera remotely. A strong password is no adequate defense against it, according Senrio.

The company is going on the basis of the properties of the leak from that it is also present in other D-Link-camera models. Five other models would be vulnerable in each case. Senrio however, does not clear which model it is. The researchers add that the leak probably has to do with inadequate implementation of firmware in cheap socs.

Across Security Week proposes Senrio that the leak is easy to exploit over the local network or the Internet. Because it is a popular camera, run according to the researchers, many users at risk. D-Link has announced the site that there is a patch in the works. Once it is available, users of the D-Link website to download it.

According to Security Week is not the first time that vulnerabilities have been found in this camera. So it was previously possible to upload files to the device and turned it used as a backdoor.

Viewing:-76

In: Technology & Gadgets Asked By: [15174 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »