漏洞描述 D-Link DCS-5222LB1和D-LinkDCS-5020L都是Bitcoin(D-Link)组织的一款无线路由器。使用1.00及之后版本固件的多款D-Link产品中存在安全漏洞。远程攻击者可借助<Camera-IP>/common/info.cgi文件利用该漏洞访问配置文件,获取型号,产品,品牌,版本,硬件版本,设备名称,位置,MAC地址,IP地址,网关IP地址,无线状态,输入/输出设置,扬声器和传感器设置信息等。
相关漏洞推荐 CVE-2019-16920: D-Link Unauthenticated remote code POC 2025-09-01 | D-Link Fofa app="D_Link-Router" CVE-2021-27250: D-LINK DAP-2020 webproc 任意文件读取漏洞 POC 2025-09-01 | D-LINK DAP-2020 近日D-Link发布公告[1]称旗下产品DAP-2020存在任意文件读取漏洞,CVE编号为CVE-2021-27250,目前已在硬件版本:A1,固件版本:1.01 上测试了PoC,由于漏洞影响核心组件... CVE-2023-5074: D-Link D-View 8 v2.0.1.28 - Authentication Bypass POC 2025-09-01 | D-Link D-View 8 Use of a static key to protect a JWT token used in user authentication can allow an for an authentic... CVE-2018-1000600: Pre-auth Fully-responded SSRF POC 2025-09-01 | Pre-auth A exposure of sensitive information vulnerability exists in Jenkins GitHub Plugin 1.29.1 and earlier... CVE-2018-1000861: Jenkins 2.138 Remote Command Execution POC 2025-09-01 | Jenkins A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier...