Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-40407

Опубликовано: 28 янв. 2022
Источник: nvd
CVSS3: 9.1
CVSS3: 7.2
CVSS2: 7.5
EPSS Средний

Описание

An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*
cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*

EPSS

Процентиль: 97%
0.32575
Средний

9.1 Critical

CVSS3

7.2 High

CVSS3

7.5 High

CVSS2

Дефекты

CWE-78
CWE-78

Связанные уязвимости

CVSS3: 9.8
github
около 4 лет назад

An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 8.8
fstec
около 4 лет назад

Уязвимость компонента SetDdns-domain микропрограммного обеспечения IP камеры Reolink RLC-410W, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 97%
0.32575
Средний

9.1 Critical

CVSS3

7.2 High

CVSS3

7.5 High

CVSS2

Дефекты

CWE-78
CWE-78