• Home Support Forums Security Advisories Shop     English | French
Support Announcement
DCS-930L / DCS-931L / DCS-932L / DCS-933L / DCS-934L / DCS-935L / DCS-936L / DCS-940L / DCS-942L / DCS-960L / (non-US) DCS-5000L :: All H/W Revs. :: All Firmware Versions :: End of Support / End of Life Product :: Reported Vulnerabilities

 

Overview  

 

The DCS-930L / DCS-931L / DCS-932L / DCS-933L / DCS-934L / DCS-935L / DCS-936L / DCS-940L / DCS-942L / DCS-960L / (non-US) DCS-5000L, all H/W Revs all hardware revisions have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle.  These products have been identified as having multiple vulnerabilities.

 

To mitigate these issues, the device would need to support HTTPS. The DCS-932L ended sales in the US on May 1, 2019.  The DCS-932L is no longer supported, and development has ceased.  D-Link recommends retiring and replacing these cameras with supported devices.  The DCS-5000L was not sold in the US, and D-Link Corporation has ended the product's life cycle; you should contact your regional D-Link support for their suggestions.

 

D-Link Corporation and D-Link North America (D-Link Systems, Inc.) recommend that all current users take one or more of the following actions:

 

1.             Transition to a current-generation product that has active firmware development and customer support.

2.             Perform comprehensive data backup.

3.             Contact our local regional office for further recommendations or information (LINK). 

 

By standard industry practice, products that have reached EOL/EOS status may no longer receive technical support or firmware updates. Please read the detailed information and recommendations provided below. 

 

Please read the informationand recommendations below.
 

3rd Party Report information   

 

Report 1: (09/03/21) 

 

        Author(s):

Hristo Georgiev :: hristog _at_ kth _dot_ se

Azad Mustafa :: azadm _at_ kth.se

 

Disclosure: DCS-932L & (non-US) DCS-5000L
Description: The use of basic authentication for the device’s command interface allows attack vectors that may compromise the camera’s configuration and enable malicious users on the LAN to access the device. The latest firmware for the devices enables digest authentication to help mitigate this issue. Please see exploit 2 for digest-authentication vulnerability.

 

 

 Report 2: (09/03/21) 

 

         Author(s):

 

Hristo Georgiev :: hristog _at_ kth _dot_ se

Azad Mustafa :: azadm _at_ kth.se

 

Disclosure: DCS-932L & (non-US) DCS-5000L
Description: Thee use of digest authentication for the device’s command interface may allow further attack vectors that may compromise the camera’s configuration and enable malicious users on the LAN to access the device.



Report 3: (05/29/24)

 

         Author(s):

 

Chuan Qin ::  qinchuan _at_ iie _dot_ ac _dot_ cn

 

Disclosure: DCS-932L (Link)

Description: Stack-Overflow can elevate into DDoS

 

 

Report 4: (06/04/25) 

 

         Author(s):

 

pjqwudi – VULdb Disclosure

 

Disclosure:  CVE-2025-5572 : (Link) : D-Link DCS-932L setSystemEmail stack-based overflow

         CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption

         CVSS:

Score

Severity

Version

Vector String

8.7

HIGH

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

8.8

HIGH

3.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8

HIGH

3.0

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.0

2.0

AV:N/AC:L/Au:S/C:C/I:C/A:C

Affected: All models, Derivative Models, All Revisions, and All Firmware

 

Affected Models

 

Model

Rev

Region

Accused firmware

EOL/EOS

 Status

Recommendation

 Last Updated

DCS-930L

All

Worldwide

None Known

10/31/18

Legacy(Link)

Retire and Replace

5/29/24

DCS-931L

All

Worldwide

None Known

7/1/18

Legacy(Link)

Retire and Replace

5/29/24

DCS-932L

All

Worldwide

v2.18 and Older

5/1/19

Legacy(Link)

Retire and Replace

5/29/24

DCS-933L

All

Worldwide

None Known

 01/31/20

Legacy(Link)

Retire and Replace

5/29/24

DCS-934L

All

Worldwide

None Known

 07/01/18

Legacy(Link)

Retire and Replace

5/29/24

DCS-935L

All

Worldwide

None Known

 03/31/20

Legacy(Link)

Retire and Replace

5/29/24

DCS-936L

All

Worldwide

None Known

8/19/19

Legacy(Link)

Retire and Replace

5/29/24

DCS-940L

All

Worldwide

None Known

9/1/15

Legacy(Link)

Retire and Replace

5/29/24

DCS-942L

All

Worldwide

None Known

7/1/18

Legacy(Link)

Retire and Replace

5/29/24

DCS-960L

All

Worldwide

None Known

 06/01/19

Legacy(Link)

Retire and Replace

5/29/24

DCS-5000L

All

Worldwide

v1.05

11/29/23

(non-US) None

Contact Regional Office

9/3/21

 

Recommendation for End of Support /End of Life Products

 

From time to time, D-Link will determine that some of its products have reached the End of Support ("EOS") or End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to the evolution of technology, market demands,   innovations, product efficiencies based on new technologies, or the product matures over time and should be replaced by functionally superior technology.

 

For US Consumer

If a product has reached its End of Support ("EOS") and End of Life ("EOL"), there is usually no further extended support or development available for it.

 

Typically, for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support have ceased. 

 

D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please ensure the device has the most recent firmware, frequently update the device's unique password to access its web configuration, and always enable Wi-Fi encryption with a unique password.