9.8
CRITICAL
CVE-2013-1599
D-Link IP Cameras Command Injection Vulnerability
Description

A Command Injection vulnerability exists in the /var/www/cgi-bin/rtpd.cgi script in D-Link IP Cameras DCS-3411/3430 firmware 1.02, DCS-5605/5635 1.01, DCS-1100L/1130L 1.04, DCS-1100/1130 1.03, DCS-1100/1130 1.04_US, DCS-2102/2121 1.05_RU, DCS-3410 1.02, DCS-5230 1.02, DCS-5230L 1.02, DCS-6410 1.00, DCS-7410 1.00, DCS-7510 1.00, and WCS-1100 1.02, which could let a remote malicious user execute arbitrary commands through the camera’s web interface.

INFO

Published Date :

Jan. 28, 2020, 8:15 p.m.

Last Modified :

April 27, 2021, 7:52 p.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

3.9
Public PoC/Exploit Available at Github

CVE-2013-1599 has a 4 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2013-1599 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Dlink dcs-1130_firmware
2 Dlink dcs-1100_firmware
3 Dlink dcs-3411_firmware
4 Dlink dcs-3430_firmware
5 Dlink dcs-5605_firmware
6 Dlink dcs-5635_firmware
7 Dlink dcs-1100l_firmware
8 Dlink dcs-1130l_firmware
9 Dlink dcs-2102_firmware
10 Dlink dcs-2121_firmware
11 Dlink dcs-3410_firmware
12 Dlink dcs-5230_firmware
13 Dlink dcs-5230l_firmware
14 Dlink dcs-6410_firmware
15 Dlink dcs-7410_firmware
16 Dlink dcs-7510_firmware
17 Dlink wcs-1100_firmware
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2013-1599.

URL Resource
http://www.exploit-db.com/exploits/25138 Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/59564 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/83941 Third Party Advisory VDB Entry
https://packetstormsecurity.com/files/cve/CVE-2013-1599 Third Party Advisory VDB Entry
https://seclists.org/fulldisclosure/2013/Apr/253 Exploit Mailing List Third Party Advisory
https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities Exploit Third Party Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Exploit toolkit for old ip cameras. Inspired by Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker

embedded exploit exploit-kit ip-cameras rootshell security shodan webshell command-injection iot

Python

Updated: 4 months ago
0 stars 1 fork 1 watcher
Born at : Nov. 2, 2023, 4:34 a.m. This repo has been linked 1 different CVEs too.

在公网收集的gobypoc+部分自己加的poc

Updated: 1 week, 5 days ago
96 stars 5 fork 5 watcher
Born at : July 28, 2023, 4:28 p.m. This repo has been linked 296 different CVEs too.

None

Python

Updated: 1 week, 4 days ago
565 stars 135 fork 135 watcher
Born at : Nov. 25, 2022, 5:20 a.m. This repo has been linked 174 different CVEs too.

Class project for testing the DLink-DCS-5009L

Updated: 9 years, 5 months ago
0 stars 0 fork 0 watcher
Born at : March 30, 2015, 7:57 p.m. This repo has been linked 2 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2013-1599 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2013-1599 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Modified Analysis by [email protected]

    Apr. 27, 2021

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Feb. 03, 2020

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:L/Au:N/C:C/I:C/A:C)
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type http://www.exploit-db.com/exploits/25138 No Types Assigned http://www.exploit-db.com/exploits/25138 Exploit, Third Party Advisory, VDB Entry
    Changed Reference Type http://www.securityfocus.com/bid/59564 No Types Assigned http://www.securityfocus.com/bid/59564 Third Party Advisory, VDB Entry
    Changed Reference Type https://exchange.xforce.ibmcloud.com/vulnerabilities/83941 No Types Assigned https://exchange.xforce.ibmcloud.com/vulnerabilities/83941 Third Party Advisory, VDB Entry
    Changed Reference Type https://packetstormsecurity.com/files/cve/CVE-2013-1599 No Types Assigned https://packetstormsecurity.com/files/cve/CVE-2013-1599 Third Party Advisory, VDB Entry
    Changed Reference Type https://seclists.org/fulldisclosure/2013/Apr/253 No Types Assigned https://seclists.org/fulldisclosure/2013/Apr/253 Exploit, Mailing List, Third Party Advisory
    Changed Reference Type https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities No Types Assigned https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities Exploit, Third Party Advisory
    Added CWE NIST CWE-78
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-3411_firmware:1.02:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-3411:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-3430_firmware:1.02:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-3430:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-5605_firmware:1.01:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-5605:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-5635_firmware:1.01:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-5635:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-1100l_firmware:1.04:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-1100l:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-1130l_firmware:1.04:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-1130l:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-1100_firmware:1.03:*:*:*:*:*:*:* *cpe:2.3:o:dlink:dcs-1100_firmware:1.04:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-1100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-1130_firmware:1.03:*:*:*:*:*:*:* *cpe:2.3:o:dlink:dcs-1130_firmware:1.04:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-1130:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-2102_firmware:1.05:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-2102:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-2121_firmware:1.05:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-2121:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-3410_firmware:1.02:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-3410:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-5230_firmware:1.02:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-5230:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-5230l_firmware:1.02:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-5230l:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-6410_firmware:1.00:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-6410:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-7410_firmware:1.00:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-7410:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:dcs-7510_firmware:1.00:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:dcs-7510:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:dlink:wcs-1100_firmware:1.00:*:*:*:*:*:*:* OR cpe:2.3:h:dlink:wcs-1100:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2013-1599 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

90.11 }} -1.64%

score

0.98769

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability