Vulnerability Description
An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. The UpgradePrepare is the API that checks if a provided filename identifies a new version of the RLC-410W firmware. If the version is new, it would be possible, allegedly, to later on perform the Upgrade. An attacker can send an HTTP request to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Reolink | Rlc-410W Firmware | 3.0.0.136_20121102 |
| Reolink | Rlc-410W | - |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425ExploitTechnical DescriptionThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425ExploitTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2021-40413?
CVE-2021-40413 is a vulnerability with a CVSS score of 7.1 (HIGH). An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. The UpgradePrepare is the API that checks if a provid...
How severe is CVE-2021-40413?
CVE-2021-40413 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-40413?
Check the references section above for vendor advisories and patch information. Affected products include: Reolink Rlc-410W Firmware, Reolink Rlc-410W.