First published: Sun Jul 17 2022(Updated: )
The web server of the E1 Zoom camera through 3.0.0.716 discloses its configuration via the /conf/ directory that is mapped to a publicly accessible path. In this way an attacker can download the entire NGINX/FastCGI configurations by querying the /conf/nginx.conf or /conf/fastcgi.conf URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Reolink E1 Zoom Firmware | <=3.0.0.716 | |
Reolink E1 Zoom |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40150 is a vulnerability in the web server of the Reolink E1 Zoom camera firmware versions up to and including 3.0.0.716, where the /conf/ directory is publicly accessible, exposing the NGINX/FastCGI configurations.
CVE-2021-40150 allows an attacker to download the complete NGINX/FastCGI configurations by querying specific URIs in the /conf/ directory.
CVE-2021-40150 has a severity score of 7.5 (High).
Reolink E1 Zoom firmware versions up to and including 3.0.0.716 are affected by CVE-2021-40150.
No, the Reolink E1 Zoom camera itself is not vulnerable to CVE-2021-40150.