CVE-2024-37606

6.5 MEDIUM

📋 TL;DR

A stack overflow vulnerability in D-Link DCS-932L IP cameras allows attackers to cause denial of service via specially crafted HTTP requests. This affects DCS-932L REVB devices running firmware version 2.18.01. Attackers can crash the camera's web service, making it temporarily unavailable.

💻 Affected Systems

Products:
  • D-Link DCS-932L REVB
Versions: Firmware version 2.18.01
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the REVB hardware revision. Older revisions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical power cycle, potentially leading to extended surveillance downtime.

🟠

Likely Case

Temporary denial of service where the web interface becomes unresponsive until the device automatically restarts.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring in place.

🌐 Internet-Facing: HIGH - These cameras are often exposed to the internet for remote access, making them easily targetable.
🏢 Internal Only: MEDIUM - Still vulnerable to internal attackers or malware, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending a crafted HTTP request to the web interface. No authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check D-Link support for latest firmware

Vendor Advisory: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10247

Restart Required: Yes

Instructions:

1. Download latest firmware from D-Link support site. 2. Log into camera web interface. 3. Navigate to Setup > Maintenance > Firmware Upgrade. 4. Upload and install new firmware. 5. Camera will reboot automatically.

🔧 Temporary Workarounds

Network Segmentation

all

Place cameras on isolated VLAN with restricted access

Access Control Lists

all

Restrict HTTP access to camera management interface

🧯 If You Can't Patch

  • Remove internet-facing access and require VPN for remote management
  • Implement rate limiting on HTTP requests to the camera

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface: Setup > Maintenance > Firmware

Check Version:

curl -s http://[camera-ip]/cgi-bin/firmware.cgi | grep version

Verify Fix Applied:

Verify firmware version is updated beyond 2.18.01

📡 Detection & Monitoring

Log Indicators:

  • Multiple HTTP requests with abnormal length or patterns
  • Web service crash/restart logs

Network Indicators:

  • Unusually long HTTP requests to camera management port
  • Multiple connection attempts from single source

SIEM Query:

source="camera-logs" AND (http_request_length>10000 OR http_status=500)

🔗 References

📤 Share & Export