First published: Mon Apr 08 2019(Updated: )
On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Reolink Multiple IP Cameras | ||
Reolink RLC-410W | <=1.0.227 | |
Reolink RLC-410W Firmware | ||
Reolink C1 Pro Firmware | <=1.0.227 | |
Reolink C1 Pro Firmware | ||
Reolink C2 Pro Firmware | <=1.0.227 | |
Reolink C2 Pro Firmware | ||
Reolink RLC-422W Firmware | <=1.0.227 | |
Reolink RLC-422W Firmware | ||
Reolink RLC-511W Firmware | <=1.0.227 | |
Reolink RLC-511W Firmware | ||
All of | ||
Reolink RLC-410W | <=1.0.227 | |
Reolink RLC-410W Firmware | ||
All of | ||
Reolink C1 Pro Firmware | <=1.0.227 | |
Reolink C1 Pro Firmware | ||
All of | ||
Reolink C2 Pro Firmware | <=1.0.227 | |
Reolink C2 Pro Firmware | ||
All of | ||
Reolink RLC-422W Firmware | <=1.0.227 | |
Reolink RLC-422W Firmware | ||
All of | ||
Reolink RLC-511W Firmware | <=1.0.227 | |
Reolink RLC-511W Firmware |
The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11001 is rated as a critical vulnerability due to the ability for an authenticated admin to execute OS commands as root.
CVE-2019-11001 can allow an attacker with admin access to run arbitrary OS commands, potentially compromising the device's integrity and security.
To fix CVE-2019-11001, update your Reolink devices to a firmware version that exceeds 1.0.227.
CVE-2019-11001 affects the Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices running firmware version 1.0.227 or earlier.
If unable to update, consider restricting access to the device to mitigate risks associated with CVE-2019-11001.