An issue was discovered in D-Link 'myDlink Baby App' version 2.04.06. Whenever actions are performed from the app (e.g., change camera settings or play lullabies), it communicates directly with the Wi-Fi camera (D-Link 825L firmware 1.08) with the credentials (username and password) in base64 cleartext. An attacker could conduct an MitM attack on the local network and very easily obtain these credentials.
References
Link | Resource |
---|---|
https://dojo.bullguard.com/dojo-by-bullguard/blog/i-got-my-eyeon-you-security-vulnerabilities-in-baby-monitor/ | Exploit Third Party Advisory |
https://dojo.bullguard.com/dojo-by-bullguard/blog/i-got-my-eyeon-you-security-vulnerabilities-in-baby-monitor/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://dojo.bullguard.com/dojo-by-bullguard/blog/i-got-my-eyeon-you-security-vulnerabilities-in-baby-monitor/ - Exploit, Third Party Advisory |
Information
Published : 2018-12-20 23:29
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18767
Mitre link : CVE-2018-18767
CVE.ORG link : CVE-2018-18767
JSON object : View
Products Affected
d-link
- dcs-825l_firmware
dlink
- dcs-825l
- mydlink_baby_camera_monitor
CWE
CWE-326
Inadequate Encryption Strength