Логотип exploitDog
bind:CVE-2021-40407
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-40407

Количество 3

Количество 3

nvd логотип

CVE-2021-40407

около 4 лет назад

An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 7.2
EPSS: Средний
github логотип

GHSA-3w42-xvwv-qc2q

около 4 лет назад

An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2022-07053

около 4 лет назад

Уязвимость компонента SetDdns-domain микропрограммного обеспечения IP камеры Reolink RLC-410W, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-40407

An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 7.2
33%
Средний
около 4 лет назад
github логотип
GHSA-3w42-xvwv-qc2q

An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 9.8
33%
Средний
около 4 лет назад
fstec логотип
BDU:2022-07053

Уязвимость компонента SetDdns-domain микропрограммного обеспечения IP камеры Reolink RLC-410W, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
33%
Средний
около 4 лет назад

Уязвимостей на страницу