CVE-2026-1532

2.4 LOW

📋 TL;DR

This CVE describes a path traversal vulnerability in D-Link DCS-700L IP cameras running firmware version 1.03.09. Attackers on the local network can exploit the music file upload function to write files to arbitrary locations on the filesystem. Only users with affected, unsupported devices are impacted.

💻 Affected Systems

Products:
  • D-Link DCS-700L IP Camera
Versions: 1.03.09
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects products no longer supported by the vendor. Requires local network access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could overwrite critical system files, potentially causing denial of service or gaining persistent access to the device.

🟠

Likely Case

Local network attackers could upload malicious files to unexpected locations, potentially leading to privilege escalation or system compromise.

🟢

If Mitigated

With proper network segmentation, the impact is limited to the local network segment containing the vulnerable device.

🌐 Internet-Facing: LOW - The vulnerability requires local network access according to the description.
🏢 Internal Only: MEDIUM - Attackers on the local network can exploit this, but the CVSS score of 2.4 indicates limited impact potential.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available. Attack requires local network access and likely some level of authentication to the music upload service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available

Vendor Advisory: https://www.dlink.com/

Restart Required: No

Instructions:

No official patch is available as this product is no longer supported. Consider replacing the device with a supported model.

🔧 Temporary Workarounds

Disable Music Upload Service

all

Disable or block access to the vulnerable /setUploadMusic endpoint

# Configuration varies by device - check web interface for service controls
# Use firewall rules to block access to the music upload port

Network Segmentation

linux

Isolate the camera on a separate VLAN with restricted access

# Example iptables rule to restrict access:
# iptables -A INPUT -s 192.168.1.0/24 -p tcp --dport [CAMERA_PORT] -j ACCEPT
# iptables -A INPUT -p tcp --dport [CAMERA_PORT] -j DROP

🧯 If You Can't Patch

  • Segment the camera on a dedicated network VLAN with strict access controls
  • Implement network monitoring for unusual file upload attempts to the camera

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface at System > Firmware. If version is 1.03.09, device is vulnerable.

Check Version:

curl -s http://[CAMERA_IP]/getSystemInfo | grep FirmwareVersion

Verify Fix Applied:

Since no patch exists, verify workarounds by testing that /setUploadMusic endpoint is inaccessible or properly filtered.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload requests to /setUploadMusic
  • Path traversal patterns in upload requests (../ sequences)

Network Indicators:

  • HTTP POST requests to /setUploadMusic with path traversal payloads
  • Unusual file upload traffic to camera on non-standard ports

SIEM Query:

source="camera_logs" AND (uri="/setUploadMusic" OR message="*../*")

🔗 References

📤 Share & Export