Vulnerability Description
A memory corruption vulnerability exists in the netserver parse_command_list functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to an out-of-bounds write. An attacker can send an HTTP request to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Reolink | Rlc-410W Firmware | 3.0.0.136_20121102 |
| Reolink | Rlc-410W | - |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1451Broken LinkThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1451Broken LinkThird Party Advisory
FAQ
What is CVE-2022-21796?
CVE-2022-21796 is a vulnerability with a CVSS score of 8.2 (HIGH). A memory corruption vulnerability exists in the netserver parse_command_list functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to an out-of-bounds write....
How severe is CVE-2022-21796?
CVE-2022-21796 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-21796?
Check the references section above for vendor advisories and patch information. Affected products include: Reolink Rlc-410W Firmware, Reolink Rlc-410W.