Unknown
CVE-2013-1603
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2013-1603
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
An Authentication vulnerability exists in D-LINK WCS-1100 1.02, TESCO DCS-2121 1.05_TESCO, TESCO DCS-2102 1.05_TESCO, DCS-7510 1.00, DCS-7410 1.00, DCS-6410 1.00, DCS-5635 1.01, DCS-5605 1.01, DCS-5230L 1.02, DCS-5230 1.02, DCS-3430 1.02, DCS-3411 1.02, DCS-3410 1.02, DCS-2121 1.06_FR, DCS-2121 1.06, DCS-2121 1.05_RU, DCS-2102 1.06_FR, DCS-2102 1.06, DCS-2102 1.05_RU, DCS-1130L 1.04, DCS-1130 1.04_US, DCS-1130 1.03, DCS-1100L 1.04, DCS-1100 1.04_US, and DCS-1100 1.03 due to hard-coded credentials that serve as a backdoor, which allows remote attackers to access the RTSP video stream.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- dcs-1100 firmware 1.03,
- dcs-1100 firmware 1.04,
- dcs-1100l firmware 1.04,
- dcs-1130 firmware 1.03,
- dcs-1130 firmware 1.04,
- dcs-1130l firmware 1.04,
- dcs-2102 firmware 1.05,
- dcs-2102 firmware 1.06,
- dcs-2121 firmware 1.05,
- dcs-2121 firmware 1.06,
- dcs-3410 firmware 1.02,
- dcs-3411 firmware 1.02,
- dcs-3430 firmware 1.02,
- dcs-5230 firmware 1.02,
- dcs-5230l firmware 1.02,
- dcs-5605 firmware 1.01,
- dcs-5635 firmware 1.01,
- dcs-6410 firmware 1.00,
- dcs-7410 firmware 1.00,
- dcs-7510 firmware 1.00,
- wcs-1100 firmware 1.00
Weaknesses
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: