Description
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [4] the dns_data->dns1 variable, that has the value of the dns1 parameter provided through the SetLocal API, is not validated properly. This would lead to an OS command injection.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-27587 | An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [4] the dns_data->dns1 variable, that has the value of the dns1 parameter provided through the SetLocal API, is not validated properly. This would lead to an OS command injection. |
References
History
Tue, 15 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-04-15T19:20:22.140Z
Reserved: 2021-09-01T00:00:00.000Z
Link: CVE-2021-40410
Updated: 2024-08-04T02:44:09.640Z
Status : Modified
Published: 2022-01-28T20:15:11.740
Modified: 2024-11-21T06:24:04.533
Link: CVE-2021-40410
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD