CVE-2020-25078 Scanner

Detects 'Credential Disclosure' vulnerability in D-Link DCS-2530L and DCS-2670L affects v. DCS-2530L before 1.06.01 Hotfix and DCS-2670L through 2.02.

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

15 seconds

Time Interval

29 days

Scan only one

URL

Toolbox

-

D-Link DCS-2530L and DCS-2670L are wireless indoor/outdoor surveillance cameras designed to enhance the security of commercial and residential properties. These devices feature 180-degree wide-angle views, Wi-Fi connectivity, motion detection, and high-quality video resolution for optimal coverage and surveillance.

Recently, a vulnerability has been detected in these devices, indicating that the unauthenticated /config/getuser endpoint can allow remote administrator password disclosure. This vulnerability, labeled CVE-2020-25078, puts the privacy and security of the surveillance camera users at risk, as it can be exploited by unauthorized individuals to gain access to confidential information.

If exploited, this vulnerability can allow hackers to discover the remote administrator password and access the surveillance camera without any authentication. Hackers can gain full control of the device, access live footage, tamper with the settings, and even turn off the device's security features. This can lead to the leakage of sensitive information, illegal surveillance, and unauthorized access to the property.

Thanks to the professional features of the s4e.io platform, readers can easily and quickly learn about vulnerabilities in their digital assets. Through the platform, users can identify vulnerabilities within their assets, develop an efficient remediation plan, and improve their overall security posture, ensuring a safe digital environment.

 

REFERENCES

Get started to protecting your Free Full Security Scan