cve/2023/CVE-2023-51629.md

18 lines
1022 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-51629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51629)
![](https://img.shields.io/static/v1?label=Product&message=DCS-8300LHV2&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.06.01%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-259%3A%20Use%20of%20Hard-coded%20Password&color=brighgreen)
### Description
D-Link DCS-8300LHV2 ONVIF Hardcoded PIN Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DCS-8300LHV2 IP cameras. Authentication is not required to exploit this vulnerability.The specific flaw exists within the configuration of the ONVIF API. The issue results from the use of a hardcoded PIN. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-21492.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds