Vulnerability Description
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetPtzSerial param is not object. An attacker can send an HTTP request to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Reolink | Rlc-410W Firmware | 3.0.0.136_20121102 |
| Reolink | Rlc-410W | - |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421ExploitTechnical DescriptionThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421ExploitTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2021-44385?
CVE-2021-44385 is a vulnerability with a CVSS score of 7.7 (HIGH). A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetPtzSe...
How severe is CVE-2021-44385?
CVE-2021-44385 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-44385?
Check the references section above for vendor advisories and patch information. Affected products include: Reolink Rlc-410W Firmware, Reolink Rlc-410W.