CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared as critical. Affected by this vulnerability is the function setSystemEmail of the file /setSystemEmail. The manipulation of the argument EmailSMTPPortNumber leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Analysis
A critical stack-based buffer overflow vulnerability exists in D-Link DCS-932L camera firmware version 2.18.01 in the setSystemEmail function, allowing authenticated remote attackers to achieve complete system compromise (confidentiality, integrity, and availability). The vulnerability has been publicly disclosed with proof-of-concept code available, affecting end-of-life products no longer receiving vendor support.
Technical Context
The vulnerability is a stack-based buffer overflow (CWE-119) in the setSystemEmail endpoint (/setSystemEmail) of the D-Link DCS-932L IP camera firmware. The EmailSMTPPortNumber parameter lacks proper input validation and bounds checking, allowing an attacker to write beyond allocated stack memory. This class of memory corruption vulnerability can lead to arbitrary code execution by overwriting return addresses or function pointers on the stack. The DCS-932L is a network-attached surveillance camera running embedded firmware; the affected component handles SMTP email configuration for alert notifications. CPE identification: cpe:2.3:a:d-link:dcs-932l_firmware:2.18.01:*:*:*:*:*:*:*
Affected Products
DCS-932L (['2.18.01'])
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-16840