The client viewer app is connected to the camera through a proxy cloud server on port 2048. The root cause of the vulnerability is the ability to initiate a Man-in-the-Middle attack. Attackers could also tell if the owner is on vacation, which could lead to robbery and other dangers. For example, if a camera was used to monitor kids, the attacker could also be watching their daily activities too.
This means any sensitive information could be monitored by attackers. In addition, the D-Link DCS-2132L camera is available in the market currently.Īttackers could play audio and video streams of a user’s home, office, neighbourhood, etc.
These users are more vulnerable to a potential attack. Although there are no known incidents reported for this vulnerability and that performing such an attack is not trivial, there are still close to 1,600 DCS-2132L cameras using port 80 exposed around the world from a search via Shodan last month. According to the research released by ESET, there are multiple vulnerabilities which allow attackers to intercept and view video streams of this camera model, which poses critical privacy issues and dangers to the users.Īll users of the D-Link DCS-2132L model are affected. The DCS-2123L WiFi camera is one of the most popular models in D-Link and it is available for sale at large retailers and online. However, in return, this type of vulnerability worsens security and could result in loss of privacy. Many people use WiFi cameras to improve security of their homes or private property.