Vulnerability Description
D-Link DCS-825L devices with firmware 1.08 do not employ a suitable mechanism to prevent denial-of-service (DoS) attacks. An attacker can harm the device availability (i.e., live-online video/audio streaming) by using the hping3 tool to perform an IPv4 flood attack. Verified attacks includes SYN flooding, UDP flooding, ICMP flooding, and SYN-ACK flooding.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| D-Link | Dcs-825L Firmware | 1.08 |
| Dlink | Dcs-825L | - |
References
- https://dojo.bullguard.com/dojo-by-bullguard/blog/i-got-my-eyeon-you-security-vuExploitThird Party Advisory
- https://dojo.bullguard.com/dojo-by-bullguard/blog/i-got-my-eyeon-you-security-vuExploitThird Party Advisory
FAQ
What is CVE-2018-18442?
CVE-2018-18442 is a vulnerability with a CVSS score of 7.5 (HIGH). D-Link DCS-825L devices with firmware 1.08 do not employ a suitable mechanism to prevent denial-of-service (DoS) attacks. An attacker can harm the device availability (i.e., live-online video/audio st...
How severe is CVE-2018-18442?
CVE-2018-18442 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-18442?
Check the references section above for vendor advisories and patch information. Affected products include: D-Link Dcs-825L Firmware, Dlink Dcs-825L.