cve/2013/CVE-2013-1599.md

26 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2013-1599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1599)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Command Injection vulnerability exists in the /var/www/cgi-bin/rtpd.cgi script in D-Link IP Cameras DCS-3411/3430 firmware 1.02, DCS-5605/5635 1.01, DCS-1100L/1130L 1.04, DCS-1100/1130 1.03, DCS-1100/1130 1.04_US, DCS-2102/2121 1.05_RU, DCS-3410 1.02, DCS-5230 1.02, DCS-5230L 1.02, DCS-6410 1.00, DCS-7410 1.00, DCS-7510 1.00, and WCS-1100 1.02, which could let a remote malicious user execute arbitrary commands through the cameras web interface.
### POC
#### Reference
- http://www.exploit-db.com/exploits/25138
- https://packetstormsecurity.com/files/cve/CVE-2013-1599
- https://seclists.org/fulldisclosure/2013/Apr/253
- https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities
#### Github
- https://github.com/20142995/Goby
- https://github.com/ARPSyndicate/cvemon
- https://github.com/HimmelAward/Goby_POC
- https://github.com/Z0fhack/Goby_POC
- https://github.com/anima1111/DLink-DCS-5009L
- https://github.com/superswan/CamMander