Описание
On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.
Ссылки
- ExploitThird Party Advisory
- Broken LinkExploitThird Party Advisory
- ExploitThird Party Advisory
- Broken LinkExploitThird Party Advisory
- US Government Resource
Уязвимые конфигурации
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
EPSS
7.2 High
CVSS3
9 Critical
CVSS2
Дефекты
Связанные уязвимости
On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.
Уязвимость команды TestEmail микропрограммного обеспечения IP-камер Reolink RLC-410W, C1 Pro, Reolink C2 Pro, RLC-422W и RLC-511W, позволяющая нарушителю выполнить произвольные команды
EPSS
7.2 High
CVSS3
9 Critical
CVSS2