CVE-2025-10779
📋 TL;DR
This CVE describes a stack-based buffer overflow vulnerability in D-Link DCS-935L IP cameras through manipulation of the HNAP_AUTH/SOAPAction argument. Attackers can remotely execute arbitrary code, potentially taking full control of affected devices. Only unsupported D-Link DCS-935L cameras are affected.
💻 Affected Systems
- D-Link DCS-935L
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, lateral movement to internal networks, persistent backdoor installation, and use in botnets or surveillance operations.
Likely Case
Remote code execution allowing attackers to disable cameras, exfiltrate video feeds, or use devices as network pivots for further attacks.
If Mitigated
Limited impact if devices are isolated in separate VLANs with strict network segmentation and egress filtering.
🎯 Exploit Status
Public exploit details exist in GitHub repositories. The vulnerability requires no authentication and has simple exploitation vectors.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: None
Vendor Advisory: None
Restart Required: No
Instructions:
No official patch exists as the product is end-of-life. Consider the workarounds and risk reduction steps below.
🔧 Temporary Workarounds
Network Segmentation
allIsolate DCS-935L cameras in a separate VLAN with strict firewall rules blocking all inbound traffic except from authorized management systems.
Disable HNAP1 Service
allIf possible, disable the HNAP1 service on affected cameras to prevent exploitation of this specific vulnerability vector.
🧯 If You Can't Patch
- Immediately remove affected cameras from internet-facing networks
- Replace end-of-life DCS-935L cameras with supported models
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web interface at http://[camera-ip]/ or using nmap scan for HNAP1 service on port 80.
Check Version:
curl -s http://[camera-ip]/HNAP1/ | grep -i version
Verify Fix Applied:
No fix available to verify. Verify workarounds by confirming cameras are not internet-accessible and HNAP1 service is disabled or blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual HNAP1 SOAPAction requests
- Multiple failed authentication attempts to HNAP1 endpoint
- Abnormal process creation on camera
Network Indicators:
- Exploit traffic patterns to /HNAP1/ endpoint
- Unusual outbound connections from camera to external IPs
- Buffer overflow attempts in HTTP headers
SIEM Query:
source="camera-logs" AND (uri_path="/HNAP1/" AND http_method="POST" AND (user_agent="exploit" OR contains(content, "SOAPAction")))
🔗 References
- https://github.com/scanleale/IOT_sec/blob/main/DCS-935L-1.pdf
- https://github.com/scanleale/IOT_sec/blob/main/DCS-935L-2.pdf
- https://vuldb.com/?ctiid.325135
- https://vuldb.com/?id.325135
- https://vuldb.com/?submit.653690
- https://vuldb.com/?submit.653691
- https://www.dlink.com/
- https://github.com/scanleale/IOT_sec/blob/main/DCS-935L-1.pdf
- https://github.com/scanleale/IOT_sec/blob/main/DCS-935L-2.pdf