Researchers find leak that makes it possible to acquire D-Link WiFi camera
Security researchers from the Senrio company have found a leak in the firmware of the D-Link DCS 930L WiFi camera that allows remote arbitrary code execution. A patch is still being worked on.
The vulnerability concerns a stack overflow that can be caused by a single command containing assembly code. This allows an attacker to run malicious code on the device and, for example, change the password to access the camera remotely. A strong password is not a sufficient defense against it, according to Senrio.
Based on the properties of the leak, the company assumes that it is also present in other D-Link camera models. Five other models would be vulnerable in any case. However, Senrio does not clarify which models it concerns. The researchers add that the leak is most likely related to poor implementation of firmware in low-cost socs.
Senrio says to Securityweek that the leak can easily be exploited via the local network or via the internet. Because it is a popular camera, many users are at risk, according to the researchers. D-Link informs the site that a patch is in the works. Once it is available, users will be able to download it from the D-Link site.
According to Securityweek, it is not the first time that vulnerabilities have been found in this camera. For example, it was previously possible to upload files to the device and it turned out to be usable as a backdoor.