First published: Fri Jan 28 2022(Updated: )
An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. All the Get APIs that are not included in cgi_check_ability are already executable by any logged-in users. An attacker can send an HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Reolink RLC-410W | =3.0.0.136_20121102 | |
Reolink RLC-410W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40416 has a medium severity level due to its potential for unauthorized access by logged-in users.
To mitigate CVE-2021-40416, ensure that all APIs are properly checked for permissions and upgrade to a patched version if available.
CVE-2021-40416 affects the Reolink RLC-410W running firmware version 3.0.0.136_20121102.
Yes, CVE-2021-40416 can be exploited remotely by sending malicious HTTP requests to the vulnerable device.
Due to CVE-2021-40416, an attacker could potentially execute unintended Get API calls on the device.