First published: Fri Jan 28 2022(Updated: )
An OScommand injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [8] the devname variable, that has the value of the name parameter provided through the SetDevName API, is not validated properly. This would lead to an OS command injection.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Reolink RLC-410W | =3.0.0.136_20121102 | |
Reolink RLC-410W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40412 is rated as a critical vulnerability due to the potential for OS command injection.
To fix CVE-2021-40412, upgrade the Reolink RLC-410W to a patched version beyond v3.0.0.136_20121102.
If exploited, CVE-2021-40412 could allow an attacker to execute arbitrary OS commands on the affected device.
CVE-2021-40412 specifically affects the Reolink RLC-410W running firmware version 3.0.0.136_20121102.
Yes, CVE-2021-40412 can be exploited remotely through compromised network settings.