Vulnerability Details : CVE-2019-10999
Potential exploit
The D-Link DCS series of Wi-Fi cameras contains a stack-based buffer overflow in alphapd, the camera's web server. The overflow allows a remotely authenticated attacker to execute arbitrary code by providing a long string in the WEPEncryption parameter when requesting wireless.htm. Vulnerable devices include DCS-5009L (1.08.11 and below), DCS-5010L (1.14.09 and below), DCS-5020L (1.15.12 and below), DCS-5025L (1.03.07 and below), DCS-5030L (1.04.10 and below), DCS-930L (2.16.01 and below), DCS-931L (1.14.11 and below), DCS-932L (2.17.01 and below), DCS-933L (1.14.11 and below), and DCS-934L (1.05.04 and below).
Vulnerability category: OverflowMemory CorruptionExecute code
Products affected by CVE-2019-10999
- cpe:2.3:o:dlink:dcs-930l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dcs-931l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dcs-932l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dcs-933l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dcs-934l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dcs-5009l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dcs-5010l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dcs-5020l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dcs-5025l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dcs-5030l_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-10999
26.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-10999
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2019-10999
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-10999
-
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10131
D-Link Technical Support
-
https://github.com/fuzzywalls/CVE-2019-10999
GitHub - fuzzywalls/CVE-2019-10999: Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well.Exploit;Third Party Advisory
Jump to