First published: Fri Jan 28 2022(Updated: )
A firmware update vulnerability exists in the 'factory' binary of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted series of network requests can lead to arbitrary firmware update. An attacker can send a sequence of requests to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Reolink RLC-410W | =3.0.0.136_20121102 | |
Reolink RLC-410W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40419 is classified as high severity due to its potential to allow arbitrary firmware updates on vulnerable devices.
To fix CVE-2021-40419, update your Reolink RLC-410W firmware to the latest version that addresses this vulnerability.
CVE-2021-40419 specifically affects the Reolink RLC-410W running firmware version 3.0.0.136_20121102.
An attacker exploiting CVE-2021-40419 could send specially-crafted requests to perform unauthorized firmware updates.
Yes, CVE-2021-40419 is a network-based vulnerability that requires sending crafted requests over the network.