CVE-2018-18767

An issue was discovered in D-Link 'myDlink Baby App' version 2.04.06. Whenever actions are performed from the app (e.g., change camera settings or play lullabies), it communicates directly with the Wi-Fi camera (D-Link 825L firmware 1.08) with the credentials (username and password) in base64 cleartext. An attacker could conduct an MitM attack on the local network and very easily obtain these credentials.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dlink:mydlink_baby_camera_monitor:2.04.06:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:d-link:dcs-825l_firmware:1.08:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dcs-825l:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:56

Type Values Removed Values Added
References () https://dojo.bullguard.com/dojo-by-bullguard/blog/i-got-my-eyeon-you-security-vulnerabilities-in-baby-monitor/ - Exploit, Third Party Advisory () https://dojo.bullguard.com/dojo-by-bullguard/blog/i-got-my-eyeon-you-security-vulnerabilities-in-baby-monitor/ - Exploit, Third Party Advisory

Information

Published : 2018-12-20 23:29

Updated : 2024-11-21 03:56


NVD link : CVE-2018-18767

Mitre link : CVE-2018-18767

CVE.ORG link : CVE-2018-18767


JSON object : View

Products Affected

d-link

  • dcs-825l_firmware

dlink

  • dcs-825l
  • mydlink_baby_camera_monitor
CWE
CWE-326

Inadequate Encryption Strength