Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1532: Path Traversal in D-Link DCS-700L

0
Medium
VulnerabilityCVE-2026-1532cvecve-2026-1532
Published: Wed Jan 28 2026 (01/28/2026, 20:32:09 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DCS-700L

Description

A vulnerability was identified in D-Link DCS-700L 1.03.09. The affected element is the function uploadmusic of the file /setUploadMusic of the component Music File Upload Service. The manipulation of the argument UploadMusic leads to path traversal. The attack can only be initiated within the local network. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:32:00 UTC

Technical Analysis

CVE-2026-1532 identifies a path traversal vulnerability in the D-Link DCS-700L IP camera firmware version 1.03.09. The vulnerability resides in the Music File Upload Service component, specifically in the uploadmusic function accessed via the /setUploadMusic endpoint. By manipulating the UploadMusic argument, an attacker can perform directory traversal attacks, potentially accessing or modifying files outside the intended directory scope. The attack vector is limited to local network access, requiring the attacker to have high privileges on the device (as indicated by the CVSS vector PR:H). No user interaction is necessary, and the vulnerability impacts confidentiality and integrity with low scope change. The device is no longer supported by the vendor, and no official patches are available. Although no known exploits are currently observed in the wild, a public exploit exists, increasing the risk of exploitation in environments where these devices remain deployed. The vulnerability score of 4.8 (medium) reflects the limited attack vector and required privileges but acknowledges the potential impact on device security. This vulnerability could allow attackers to access sensitive configuration files or inject malicious files, undermining device operation and network security.

Potential Impact

The primary impact of CVE-2026-1532 is unauthorized access to or modification of files on the affected D-Link DCS-700L device. This could lead to compromise of device integrity, exposure of sensitive configuration or credential files, and potential pivoting within the local network. Since the device is an IP camera, attackers might leverage this vulnerability to disrupt video surveillance, disable security monitoring, or use the device as a foothold for further attacks. The requirement for local network access and high privileges limits the scope of exploitation but does not eliminate risk in environments where network segmentation is weak or where attackers have gained internal access. The lack of vendor support and patches increases the risk for organizations still operating these legacy devices, as vulnerabilities remain unmitigated. Overall, this vulnerability could degrade the confidentiality and integrity of surveillance data and network security posture.

Mitigation Recommendations

Given the absence of vendor patches, organizations should implement compensating controls to mitigate this vulnerability. First, isolate the affected D-Link DCS-700L devices on a dedicated VLAN or network segment with strict access controls to limit local network exposure. Employ network access control (NAC) solutions to restrict device communication only to trusted hosts. Disable or restrict access to the Music File Upload Service if possible, or monitor traffic to the /setUploadMusic endpoint for suspicious activity. Replace unsupported devices with newer, supported models that receive security updates. Regularly audit network devices for legacy hardware and remove or upgrade vulnerable equipment. Additionally, implement strong authentication and privilege management on the local network to prevent unauthorized users from gaining the high privileges required to exploit this vulnerability. Continuous monitoring and intrusion detection systems can help identify exploitation attempts within the local network.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-28T13:28:05.800Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697a76b14623b1157cee2bdc

Added to database: 1/28/2026, 8:50:57 PM

Last enriched: 2/23/2026, 10:32:00 PM

Last updated: 3/25/2026, 3:19:17 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses